Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Phantom Secrets Persist in Git SCMs

June 24, 2024
Reading Time: 2 mins read
in Alerts
Phantom Secrets Persist in Git SCMs

Aqua Security’s new research reveals a troubling issue in Git-based Source Code Management (SCM) systems: code containing secrets remains accessible even after deletion. These so-called ‘phantom’ secrets, such as passwords, tokens, and passkeys, continue to be exposed despite removal, primarily because conventional scanning methods often fail to detect them. Aqua’s study highlights that approximately 18% of potentially exposed secrets are missed by typical scanners, which only check repositories accessible via the Git clone command.

In their investigation, Aqua analyzed over 50,000 repositories from top organizations on GitHub and discovered significant security flaws. Among these were API tokens and other sensitive data found in public repositories, including Mozilla’s, which granted access to internal tools and systems. This data could lead to severe security breaches, such as unauthorized access to cloud environments, internal project infrastructure, and telemetry platforms.

Aqua’s findings also revealed exposed Meraki API tokens from Fortune 500 companies and an Azure service principal token from a large healthcare provider. These tokens had high privileges and could be used to access critical systems and perform malicious actions, such as supply chain attacks. The persistence of these secrets in repositories underscores the risks associated with hardcoded credentials and inadequate scanning tools.

To address these risks, Aqua advises developers to avoid hardcoding secrets in code and to consider any exposed secrets as compromised. Security best practices include rotating compromised secrets immediately and removing them from public repositories. Despite advancements in secrets scanning tools, the issue remains prevalent, emphasizing the need for continuous vigilance and robust security practices throughout the software development lifecycle.

Reference:

  • Phantom Secrets Persist in Git Source Code Management Systems Even After Deletion
Tags: APIAqua SecurityCyber AlertsCyber Alerts 2024Cyber threatsGitHealthcareJune 2024MozillaResearchSCMSource Code Management
ADVERTISEMENT

Related Posts

Chrome Extensions Leak Data And API Keys

Chrome Extensions Leak Data And API Keys

June 6, 2025
Chrome Extensions Leak Data And API Keys

AMOS Stealer Hits macOS Via Fake CAPTCHA

June 6, 2025
Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

June 6, 2025
UNC6040 Vishing Group Target Salesforce Data

UNC6040 Vishing Group Target Salesforce Data

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

New Chaos RAT Variant Hits Windows and Linux

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

FBI Warns Hedera NFT Airdrop Crypto Scam

June 5, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial