top | item 37417895

(no title)

macca321 | 2 years ago

You can exfiltrate secrets that aren't in the state, but are in accessible resources during a plan using an http data source with the secret encoded into the url

discuss

order

No comments yet.