Tell HN: Github has dozens of public s3 passwords
So, I got curious. Are there people out there who forget cover their tracks?
A quick search shows quite a few 'open' buckets out there. What's the best way to warn these folks? What other credentials are lurking out there?
Here's the search: http://github.com/search?langOverride=&language=&q=S3+Base.establish_connection&repo=&start_value=1&type=Code&x=0&y=0
And the first open bucket I found: http://github.com/prakashraman/jammmin/blob/a668672c69fafdb8317fec4fb19b7abb0b318e1a/app/scripts/s3_connect.rb
[+] [-] jah|15 years ago|reply
http://help.github.com/removing-sensitive-data/
[+] [-] DavidSJ|15 years ago|reply
[+] [-] relix|15 years ago|reply
I concocted the following command to change all mentions of a specific word to another word, in a git repository:
Use this to check if there are any mentions of some word, e.g. your password, in the repository:[+] [-] ritonlajoie|15 years ago|reply
Sure, posting that on HN is a good way...
[+] [-] pierrefar|15 years ago|reply
[+] [-] prakashraman|15 years ago|reply
Thank you, kabuks, so much for noticing this. I have changed my S3 key pair and am getting to cleaning up my git commits.
My God ! But thanks so much.
[+] [-] milkshakes|15 years ago|reply
[+] [-] mrduncan|15 years ago|reply
Don't forget to make it a private discussion.
[+] [-] roder|15 years ago|reply
http://github.com/roder/riakaws/blob/master/clouds.rb#L10
[+] [-] pskomoroch|15 years ago|reply
I just sent this to a few people (including someone who had forked one of my projects and added their S3 keys to a config file):
Noticed you have your Amazon S3 keys out in the open on github. You might want to remove those config files from your repository as described in the thread here:
http://news.ycombinator.com/item?id=1574211
-Pete
[+] [-] gojomo|15 years ago|reply
[+] [-] tlrobinson|15 years ago|reply
Of course you'll need to include that sensitive data in the script, though the first few characters of AWS credentials should be unique enough.
I thought about setting up something similar for networking. If a packet contains my password in cleartext then pop up a warning allowing/denying (denying would have to force the connect to close, I guess). Might be too much overhead though.
[+] [-] ck2|15 years ago|reply
Mark the file as excluded from svn/git.
Make a settings.sample file for the project.
[+] [-] baxter|15 years ago|reply
[+] [-] trevorturk|15 years ago|reply
...this kind of thing doesn't have to be Heroku-specific, though.
[+] [-] jbeda|15 years ago|reply
[+] [-] thenduks|15 years ago|reply
You can use any number of very low-barrier strategies to solve this. One that was mentioned a few times in this thread is to use environment variables. Personally I just put a {whatever}.yml or similar in my project tree somewhere and throw it in .gitignore.
I can't imagine a process that starts with "go to westorecredentials.com and sign up..." being any easier. Willing to be surprised :)
[+] [-] kabuks|15 years ago|reply
[+] [-] jeebusroxors|15 years ago|reply
[+] [-] igorgue|15 years ago|reply
PS: I do it all the time on my private repos but I try to not do it on the public ones.
[+] [-] ulf|15 years ago|reply
Just put "from localsettings import *" in your settings-file, and keep all deployment-specific settings in the localsettings-file
[+] [-] adrianscott|15 years ago|reply
[+] [-] megafotze|15 years ago|reply
[deleted]