Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[POC] Test gitguardian with fake credentials #801

Closed
wants to merge 5 commits into from

Conversation

antonymilne
Copy link
Contributor

Description

Screenshot

Notice

  • I acknowledge and agree that, by checking this box and clicking "Submit Pull Request":

    • I submit this contribution under the Apache 2.0 license and represent that I am entitled to do so on behalf of myself, my employer, or relevant third parties, as applicable.
    • I certify that (a) this contribution is my original creation and / or (b) to the extent it is not my original creation, I am authorized to submit this contribution on behalf of the original creator(s) or their licensees.
    • I certify that the use of this contribution as authorized by the Apache 2.0 license does not violate the intellectual property rights of anyone else.
    • I have not referenced individuals, products or companies in any commits, directly or indirectly.
    • I have not added data or restricted code in any commits, directly or indirectly.

Copy link

gitguardian bot commented Oct 15, 2024

⚠️ GitGuardian has uncovered 3 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
14157696 Triggered MongoDB Credentials a99773b README.md View secret
14200722 Triggered AWS Keys 942edc4 CODE_OF_CONDUCT.md View secret
14200722 Triggered AWS Keys 8055938 CODE_OF_CONDUCT.md View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the secret, review where it is currently used and what would be the impact of revoking/rotating the secret.
  2. Revoke or rotate the secret.
  3. Log in to GitGuardian and follow remediation guidance.

To avoid such incidents in the future, consider

If you have any questions or feedback, please reach out to us on #gitguardian slack channel.


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@antonymilne antonymilne mentioned this pull request Oct 18, 2024
1 task
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant