TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Private keys committed to Github repositories

27 点作者 truxs超过 12 年前

18 条评论

aaronpk超过 12 年前
No, this is people committing their private keys to a Github repository. Github is not at fault.<p>edit: submitter has since updated the title, was: "Github giving away your private key"
评论 #5105435 未加载
评论 #5105517 未加载
femto113超过 12 年前
Definitely a "you did what?" situation but probably still newsworthy since the new search tool makes the user's error easier to exploit and the publicity about the tool will make it more likely that someone will exploit it.
nodesocket超过 12 年前
Here is how to check if you ever committed your private SSH key by accident:<p><pre><code> https://github.com/search?q=%40user-name-here+path%3A.ssh%2Fid_rsa&#38;type=Code&#38;ref=searchresults</code></pre>
NathanKP超过 12 年前
Many of the items on that list are actually public keys, which should be perfectly safe to share to the world in a Git repo, but there are definitely a few private keys in there as well.
评论 #5106153 未加载
kalmar超过 12 年前
Not just github: <a href="https://www.google.com/search?q=site%3Agithub.com+inurl%3Aid_rsa" rel="nofollow">https://www.google.com/search?q=site%3Agithub.com+inurl%3Aid...</a>
orangethirty超过 12 年前
I hope people take the high road here and dont make an example out of github members. People make mistakes. You dont need to delete their repo to show them. A friendly email will do.<p>Also Github, provide an option to protect those who are less security savy.
rbut超过 12 年前
Don't forget id_dsa as well. <a href="https://github.com/search?q=path%3A.ssh%2Fid_dsa&#38;type=Code&#38;ref=searchresults" rel="nofollow">https://github.com/search?q=path%3A.ssh%2Fid_dsa&#38;type=Co...</a>
guptaneil超过 12 年前
.ssh should probably be on a default .gitignore list, along with .DS_Store
kbar13超过 12 年前
for those saying that github or git should have a default rule preventing private keys from being committed, I say:<p>lolwat?<p>private keys are private. these people -know- that they are pushing a git repo to a very public site. as such, they should recognize that * is going to be visible in their dotfiles repo. it's not git or github's fault that users are doin it wrong!
评论 #5105794 未加载
2468ben超过 12 年前
Can someone just write a script that crawls this page for updates, then sends the users an email telling them what they did?
troyjfarrell超过 12 年前
It's actually very handy to keep your private keys in a VCS (along with other dotfiles.) I keep mine in a private repository. I don't worry about it because all my private keys are encrypted with strong passphrases.
squeed超过 12 年前
My favorite: searching for typos.<p><a href="https://github.com/search?q=legnth&#38;p=1&#38;ref=searchbar&#38;type=Code&#38;l=" rel="nofollow">https://github.com/search?q=legnth&#38;p=1&#38;ref=searchbar...</a>
X-Istence超过 12 年前
Github is serving up private keys for those that added them to a git repository. I was wondering how they would be giving away my private key ... without me giving it to them.
rcthompson超过 12 年前
I wonder if there's a case for a default pre-commit hook that greps for anything secret-looking such as ssh private keys, gpg keys, etc. and bails if it detects any.
bradfa超过 12 年前
More than half those results are public keys. It's not as bad as first impressions would indicate.
chadscira超过 12 年前
I knew this was going to happen, i'm sure other goodies will be found too.
评论 #5107321 未加载
BuzzKilla1960超过 12 年前
Finally a github search that works!!!!
DrJ超过 12 年前
author should grep -v pub from the keys list.