#0001
CISA Contractor Leaked `AWS GovCloud` Keys on GitHub
40radar
A public repo exposed high-privilege cloud and internal credentials. Treat secret scanning as a production control, not a checkbox.
- The public
Private-CISArepo exposed high-privilegeAWS GovCloudcredentials, plaintext passwords, tokens, and logs. - Default protections that block secret publishing appear to have been disabled; one bad repo setting can bypass the whole safety net.
- Immediate takeaway: enforce secret scanning, pre-commit checks, and key rotation even on private or internal repos.
Source: news.hada.io/topic?id=29689Read original →
