Granular permissions have been introduced for third-party applications, allowing them to request specific levels of access—read-only, read/write, or full admin—to public SSH keys, giving users control over access decisions. Users can easily revoke SSH access, as any SSH key created by an OAuth application will be automatically deleted when its access is revoked. Security is further enhanced by notifying users via email whenever a new key is added, and users have the ability to audit and delete their SSH keys at any time. More details about these changes can be found on the GitHub Developer site.