paint-brush
Exposing Secrets on GitHub: What to Do After Leaking Credentials and API Keysby@jean-GG
1,040 reads
1,040 reads

Exposing Secrets on GitHub: What to Do After Leaking Credentials and API Keys

by Jean Dubrulle | GitGuardian5mMarch 27th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

If you have just exposed a sensitive file or secrets to a public git repository, there are some important steps to follow. This post will go through the four steps needed to remove the risk and make sure it doesn't happen in the future. If you make the repository private or delete the files you can reduce the risk of someone new discovering your leak but it is very likely your files will still exist for those that know where to look. Even if you delete the file or repository, your secrets are still compromised.

Company Mentioned

Mention Thumbnail
featured image - Exposing Secrets on GitHub: What to Do After Leaking Credentials and API Keys
Jean Dubrulle | GitGuardian HackerNoon profile picture
Jean Dubrulle | GitGuardian

Jean Dubrulle | GitGuardian

@jean-GG

L O A D I N G
. . . comments & more!

About Author

Jean Dubrulle | GitGuardian HackerNoon profile picture
Jean Dubrulle | GitGuardian@jean-GG

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here