-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
Security Alert: Leaked Aws Access Key
Your repository contains a Aws Access Key that has been identified in a public repository.
| Detail | Value |
|---|---|
| File | .env |
| Status | Exposed in public repository |
Immediate Actions
- Rotate the secret immediately in your aws dashboard
- Remove the secret from source code
- Add
.envto.gitignore(if not already) - Use
git filter-branchor BFG Repo-Cleaner to remove from git history - Consider using environment variables or a secrets manager
About This Alert
This is a responsible disclosure. We attempted to file this as a private security advisory first. The secret value has NOT been stored or shared beyond this notification.
GitHub's automated secret scanning may have already notified the service provider. However, your repository still contains the exposed credential, which should be removed and rotated.
Vibe Scanner - responsible disclosure for leaked secrets
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels