Open HKResearch opened 10 years ago
Hi,
Thanks for the heads up. These files do, in fact, contain passwords, but only for private development environments (passwords are changed when deployed to production), so I did not make a change as a result of the report.
Thanks,
Mike
From: HKResearch notifications@github.com Reply: MikeBarnlund/SpiralDesign reply@reply.github.com Date: July 3, 2014 at 11:04:02 AM To: MikeBarnlund/SpiralDesign spiraldesign@noreply.github.com Subject: [SpiralDesign] Possible Vulnerability (#1)
Hello,
We are conducting research on the unintended exposure of secrets in GitHub repositories. In a recent scan we conducted of GitHub repositories, our tool detected that one of your repositories appears to expose a secret, and we've confirmed this possibility by manual inspection. The details are below:
If this information is indeed intended to be secret, we would recommend that you remove this file from the repository (using .gitignore) and generate new passwords for the vulnerable accounts. We would much appreciate a response, letting us know if we are mistaken in concluding that this is a secret, or if you made changes as a result of this report.
Thank you.
— Reply to this email directly or view it on GitHub.
Hello,
We are conducting research on the unintended exposure of secrets in GitHub repositories. In a recent scan we conducted of GitHub repositories, our tool detected that one of your repositories appears to expose a secret, and we've confirmed this possibility by manual inspection. The details are below:
If this information is indeed intended to be secret, we would recommend that you remove this file from the repository (using .gitignore) and generate new passwords for the vulnerable accounts. We would much appreciate a response, letting us know if we are mistaken in concluding that this is a secret, or if you made changes as a result of this report.
Thank you.