Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secret leaked in dockerdata/.tfc/terraform.tfstate (Medium) #15

Open
mijho opened this issue Apr 23, 2024 — with Aikido Issues · 0 comments
Open

Secret leaked in dockerdata/.tfc/terraform.tfstate (Medium) #15

mijho opened this issue Apr 23, 2024 — with Aikido Issues · 0 comments
Assignees

Comments

Copy link
Contributor

mijho commented Apr 23, 2024

Find more live information in Aikido here: https://app.aikido.dev/queue?sidebarIssue=41647&groupId=333&sidebarIssueTask=14760&sidebarTab=tasks

==== Scope ====
This task includes issues in the following code repository:

  • elysium: dockerdata/.tfc/terraform.tfstate

==== TLDR ====
We detected secret *****B64L in the git history of the repository. The secret was found in dockerdata/.tfc/terraform.tfstate.
View commit: https://github.com/mirrorweb/elysium/blob/c82ada834a53e7368178af1a2af69327964f8f06/dockerdata/.tfc/terraform.tfstate#L243

==== How to fix ====
If this API key is harmless, you can ignore this issue. If not, we would advise to move the secret out of the git repository by either injecting it via the environment or even better, by using a tool such as AWS Secrets Manager to inject the secrets at run-time. After that, it should be possible to invalidate the current secret and regenerate a new one.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants