Akeyless Security’s Post

View organization page for Akeyless Security, graphic

7,458 followers

🚨 Aqua Security has uncovered a significant risk in Git-based Source Code Management (SCM) systems like GitHub, GitLab, and Bitbucket. Deleted or updated secrets—like API tokens and credentials—can persist in these systems, creating "phantom secrets." 🚨 Why This Matters To You Even if developers overwrite or delete these secrets, they can remain accessible. This vulnerability has led to major exposures, notably in high-profile projects like Mozilla and Cisco Meraki. Here's the scoop: when developers commit hard-coded secrets in SCMs and then overwrite or delete them, these secrets can still persist in the repository versions. This makes them easy prey for malicious actors, especially in open-source projects or public repositories. The Scanner Shortfall Most secrets scanners today can't effectively scan these buried files. They typically use the git clone command to snapshot and scan repositories, missing some files deep in the file system. However, attackers who know what to look for can find them. The Takeaway Developers should never commit code with hard-coded secrets. Regularly rotate secrets and view secrets management as a full SDLC challenge. At Akeyless Security we focus on making secrets management seamless and secure for developers from day one. Our solution not only secures your development lifecycle but also simplifies it and massively reduces costs by removing the burden of servers and maintenance. Protect your enterprise from the hidden risks of phantom secrets. Learn how Akeyless can help you secure your development lifecycle from start to finish like our Fortune 500 clients. Read the report --> https://hubs.li/Q02DHc_b0 #DevOps #DevSecOps #GitHub #GitLab #Bitbucket

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics