TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

View leaked secrets in Git live

166 pointsby smaslennikovover 5 years ago

11 comments

thepoetover 5 years ago
We created a static version of this (almost similar to shodan but for keys) using publicly accessible Github dump hosted on Google Cloud in 2017. We then hosted the processed data, website and our search infra on AWS. AWS security team reached out to us for a potential “collaboration” and asked us to send all AWS keys that we discovered and we sent them the whole list. As a tiny startup, we were elated. Few days later they call us and threaten with a cease and desist notice if we do not take down the website. Remember we are not targeting AWS keys, neither are we in violation of any licensing agreements with respect to the data. We refused to shut it down. They then ask us to stop hosting it on AWS or “anywhere” else since we were using AWS credits to host the product or they will shut our account. When their this strategy did not work out, they contacted someone at Stripe who had given us the AWS credits, who then asked us to take it down or face consequences. We eventually had to shut it down since we did not have a lot of money to fight these people.<p>It was a stressful week for us where we learnt that corporates can lie and bully you to get whatever they want and then can shut you down. Unless you have the means to fight back. Does not matter where you live.
评论 #21386162 未加载
darkportover 5 years ago
Author here. I released the tool a few weeks back and since downsized the EC2 instance. So this post pretty much killed the box. I&#x27;ve just up-sized it again but it&#x27;s still running fairly slowly due to high load. It typically finds around 5 secrets&#x2F;a second. Corresponding blog post here: <a href="https:&#x2F;&#x2F;darkport.co.uk&#x2F;blog&#x2F;ahh-shhgit!&#x2F;" rel="nofollow">https:&#x2F;&#x2F;darkport.co.uk&#x2F;blog&#x2F;ahh-shhgit!&#x2F;</a> and you can run your own instance here: <a href="https:&#x2F;&#x2F;github.com&#x2F;eth0izzle&#x2F;shhgit" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;eth0izzle&#x2F;shhgit</a>
dancekover 5 years ago
Blog post about shhgit: <a href="https:&#x2F;&#x2F;darkport.co.uk&#x2F;blog&#x2F;ahh-shhgit!&#x2F;" rel="nofollow">https:&#x2F;&#x2F;darkport.co.uk&#x2F;blog&#x2F;ahh-shhgit!&#x2F;</a>
adamparsonsover 5 years ago
This is highly amusing.<p>One of the first things it found was a publicly accessible oracle db. Second thing it found was someone attempting to make an authoritative repo on standards for django, which included this all-too-familiar line in settings.py<p><pre><code> # SECURITY WARNING: keep the secret key used in production secret! SECRET_KEY = &#x27;(d5%@h=u0m2a5-$4f^n(d%4mkt-@f1%h#3n64%+wmhf(kmx)ga&#x27;</code></pre>
评论 #21385235 未加载
评论 #21384721 未加载
wczekalskiover 5 years ago
This tool should create issues in relevant repos unless the repo whitelists itself explicitly. Or alternatively just create one master issue per repo (should there be more violations in the future)
评论 #21385378 未加载
评论 #21387042 未加载
jsilenceover 5 years ago
What are recommended tools for team wide secret management?
评论 #21384975 未加载
评论 #21385698 未加载
评论 #21385348 未加载
评论 #21385539 未加载
评论 #21386175 未加载
评论 #21384947 未加载
评论 #21385399 未加载
评论 #21385090 未加载
slawwwcover 5 years ago
Nice tool. Is there a similar tool that you can use privately to notify you before you commit sensitive data to git?
评论 #21386714 未加载
djvdorpover 5 years ago
Rather link: <a href="https:&#x2F;&#x2F;darkport.co.uk&#x2F;blog&#x2F;ahh-shhgit!&#x2F;" rel="nofollow">https:&#x2F;&#x2F;darkport.co.uk&#x2F;blog&#x2F;ahh-shhgit!&#x2F;</a><p>The service is currently overloaded.
happppyover 5 years ago
Got this message in alert<p>Failed to retrieve signatures! Reloading...
评论 #21384978 未加载
alacombeover 5 years ago
I can&#x27;t run this in the background more than 5 minutes without getting high CPU usage and and unresponsive tab :-(
solidasparagusover 5 years ago
I have to say I&#x27;m not a huge fan of making secret theft more convenient. I don&#x27;t see many positive uses for this website...
评论 #21384986 未加载
评论 #21385309 未加载
评论 #21384842 未加载
评论 #21384970 未加载