Skip to content

Security Alert: Leaked Aws Access Key Detected #1

@Yonkoo11

Description

@Yonkoo11

Security Alert: Leaked Aws Access Key

Your repository contains a Aws Access Key that has been identified in a public repository.

Detail Value
File .env
Status Exposed in public repository

Immediate Actions

  1. Rotate the secret immediately in your aws dashboard
  2. Remove the secret from source code
  3. Add .env to .gitignore (if not already)
  4. Use git filter-branch or BFG Repo-Cleaner to remove from git history
  5. Consider using environment variables or a secrets manager

About This Alert

This is a responsible disclosure. We attempted to file this as a private security advisory first. The secret value has NOT been stored or shared beyond this notification.

GitHub's automated secret scanning may have already notified the service provider. However, your repository still contains the exposed credential, which should be removed and rotated.


Vibe Scanner - responsible disclosure for leaked secrets

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions