Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Oh boy.

Oh boy.

Scheduled Pinned Locked Moved Uncategorized
cybersecurityappsecleadershipsecurityprivacy
3 Posts 3 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • brian_greenberg@infosec.exchangeB This user is from outside of this forum
    brian_greenberg@infosec.exchangeB This user is from outside of this forum
    brian_greenberg@infosec.exchange
    wrote last edited by
    #1

    Oh boy. Stanford researchers scanned 10 million web pages and found API keys just sitting in the public-facing code. That's 1,748 active credentials from major providers exposed in live website code, mostly inside JavaScript files. Not in old test environments. Not in a forgotten repo. In the live, running site. Banks. Healthcare providers. "Not just small companies, but some very large companies," according to the lead researcher. And some of those credentials had been sitting there for years. Not the first time I've seen something like this. πŸ€¦πŸ»β€β™‚οΈ

    The thing is that most orgs are scanning their source code but not their deployed sites. 😳 Those are two different things, and most leaks originate during the build process. A key gets baked in somewhere between development and production, and nobody catches it because the scan already ran upstream. Meanwhile, GitGuardian counted over 28 million new hardcoded secrets exposed in public GitHub commits in 2025 alone. This isn't a one-time research finding it's a systemic habit that needs to change.

    πŸ” When did your team last scan the live site, not just the codebase?
    🏦 If you're in a regulated industry, that question just became a compliance question too

    https://www.newscientist.com/article/2520143-security-credentials-inadvertently-leaked-on-thousands-of-websites/
    #Cybersecurity #AppSec #Leadership #security #privacy #cloud #infosec

    sempf@infosec.exchangeS secureowl@infosec.exchangeS 2 Replies Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

      Oh boy. Stanford researchers scanned 10 million web pages and found API keys just sitting in the public-facing code. That's 1,748 active credentials from major providers exposed in live website code, mostly inside JavaScript files. Not in old test environments. Not in a forgotten repo. In the live, running site. Banks. Healthcare providers. "Not just small companies, but some very large companies," according to the lead researcher. And some of those credentials had been sitting there for years. Not the first time I've seen something like this. πŸ€¦πŸ»β€β™‚οΈ

      The thing is that most orgs are scanning their source code but not their deployed sites. 😳 Those are two different things, and most leaks originate during the build process. A key gets baked in somewhere between development and production, and nobody catches it because the scan already ran upstream. Meanwhile, GitGuardian counted over 28 million new hardcoded secrets exposed in public GitHub commits in 2025 alone. This isn't a one-time research finding it's a systemic habit that needs to change.

      πŸ” When did your team last scan the live site, not just the codebase?
      🏦 If you're in a regulated industry, that question just became a compliance question too

      https://www.newscientist.com/article/2520143-security-credentials-inadvertently-leaked-on-thousands-of-websites/
      #Cybersecurity #AppSec #Leadership #security #privacy #cloud #infosec

      sempf@infosec.exchangeS This user is from outside of this forum
      sempf@infosec.exchangeS This user is from outside of this forum
      sempf@infosec.exchange
      wrote last edited by
      #2

      @brian_greenberg Good to have you posting again sir. You been quiet!

      1 Reply Last reply
      0
      • brian_greenberg@infosec.exchangeB brian_greenberg@infosec.exchange

        Oh boy. Stanford researchers scanned 10 million web pages and found API keys just sitting in the public-facing code. That's 1,748 active credentials from major providers exposed in live website code, mostly inside JavaScript files. Not in old test environments. Not in a forgotten repo. In the live, running site. Banks. Healthcare providers. "Not just small companies, but some very large companies," according to the lead researcher. And some of those credentials had been sitting there for years. Not the first time I've seen something like this. πŸ€¦πŸ»β€β™‚οΈ

        The thing is that most orgs are scanning their source code but not their deployed sites. 😳 Those are two different things, and most leaks originate during the build process. A key gets baked in somewhere between development and production, and nobody catches it because the scan already ran upstream. Meanwhile, GitGuardian counted over 28 million new hardcoded secrets exposed in public GitHub commits in 2025 alone. This isn't a one-time research finding it's a systemic habit that needs to change.

        πŸ” When did your team last scan the live site, not just the codebase?
        🏦 If you're in a regulated industry, that question just became a compliance question too

        https://www.newscientist.com/article/2520143-security-credentials-inadvertently-leaked-on-thousands-of-websites/
        #Cybersecurity #AppSec #Leadership #security #privacy #cloud #infosec

        secureowl@infosec.exchangeS This user is from outside of this forum
        secureowl@infosec.exchangeS This user is from outside of this forum
        secureowl@infosec.exchange
        wrote last edited by
        #3

        @brian_greenberg The fastest critical finding I made in a web app pen test came about 3 or so years ago. Was doing a zero-knowlege assessment of some online store. First thing I did was browse to the site and hit 'view source' to see what I could find out about the stack etc.

        At the very top, in a code comment, was the unmistakable shape of an AWS Access Key and Secret.

        I thought it was probably a canary, since why else would it be there? So I carefully explored it via a proxy to see what would happen.

        Friggin' valid AWS key. Attached to the root account no less.

        1 Reply Last reply
        1
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups