Skip to content

Security-related question about a possible exposed credential #74

@Emma-NYL

Description

@Emma-NYL

Hello,

My name is Emma, I am conducting an academic study on possible credential exposure in public GitHub repositories.

While analyzing this repository, I found a string that may represent a credential. I'm including the code snippet below containing possible leakage. To avoid exposing sensitive information publicly, I marked the sensitive information.

Could you please help clarify whether the detected string is:

  1. a real credential, or
  2. a placeholder / example value?

Thank you for your time.


Code snippet (sensitive values masked):

        accountName, apiKey, ok := r.BasicAuth()
        if !ok {
                // Credentials not provided.
                err := &APIError{
                        Code:    CodeCredentialsMissing,
                        Message: "You must authenticate.",
                        Hint:    "Try using multyvac.config.set_key(api_key='us****me', api_secret_key='A****ey', api_url='') before calling other multyvac methods.",
                        Retry:   false,
                }
                err.Report(http.StatusUnauthorized, w)
                return nil, err
        }

Thank you in advance for your time - I really appreciate it!

Sincerely,
Emma

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions