Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

An interesting look at one of the consequences of using git and public repo's.

Does leave me wondering how long before someone has a setup which detects and tries to exploit these in real-time, which feels like it could be nasty.

Also a challenge with these posts is they were unlikely to have been able to contact all the affected developers who have got exposed secrets, meaning that any that were uncontactable/non-responsive are likely still vulnerable now, I'd guess that means they're about see what happens if those secrets get abused, as people start exploring this more...



There are hundred of setups like that already. If you push an AWS key or similar publicly you may have a bitcoin miner or botnet running on your cloud in matter of minutes.


The point here being the blog is about looking for oops commits to spot keys that would otherwise not necessarily be picked up automatically...


Nope. Because if you push an AWS key then it gets automatically revoked by AWS.


AWS was just an example, but it kinda proves my point though, that people are already monitoring this ;)


I wouldn't rely on anything other than rotating leaked credentials.


There are already people scanning git repos for Bitcoin/Ethereum/crypto keys and exploiting them immediately.


Not just Git either. Push a container to Docker Hub and you'll get instant downloads. Presumably people scanning containers for secrets.


There's a lot of secret classes that aren't necessarily automatically scanned for. The Oops commit is a good signal that something shouldn't have been committed, even if automated scanners don't get it.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: