Okay this is really interesting. The NLRB whistleblower Daniel Berulis told me that he found the DOGE accounts had downloaded three different code libraries from GitHub that none of their IT people or contractors used or knew about. One of them, Berulis said, had in its "README" file a description that said the software was designed as "a proxy to generate pseudo-infinite IPs for web scraping and brute forcing."
One of the core DOGE employees is Marko Elez, and Elez's GitHub page has a very interesting code repository: async-ip-rotator, created in January 2025
https://github.com/markoelez/async-ip-rotator
Checking the history of this code, Elez's profile says it was forked from this
https://github.com/Ge0rg3/requests-ip-rotator, which says in its description:
"A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing."
"This library will allow the user to bypass IP-based rate-limits for sites and services."
Gee, I wonder which DOGE employee was in the NLRB in early March?