Dataset Viewer
Auto-converted to Parquet Duplicate
answer
stringclasses
6 values
question
stringclasses
1 value
context
stringlengths
120
279
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
# .env.example - Template only, no real secrets DATABASE_URL=postgresql://user:password@localhost:5432/db STRIPE_KEY=sk_test_YOUR_KEY_HERE OPENAI_API_KEY=your-api-key-here
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/THeBCYaTR/BcfPwLwf2/7hA3KNKbhbHkRFAHeAbWMA5g" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/TovcRhi8Z/Bgn7CSzTs/wF02GKV31v9iGqk37zrO9wog" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os from typing import Optional class Settings: DATABASE_URL: str = os.getenv('DATABASE_URL') SECRET_KEY: str = os.getenv('SECRET_KEY') def __init__(self): if not self.DATABASE_URL: raise ValueError('DATABASE_URL required')
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:0kmmKs8zsP4Q@db:3306/app - JWT_SECRET=wsz5DFiPeElKAZUJGQqgXKfElTMhIyqE ports: - "8080:8080"
CLASSIFICATION: EXPOSED SECRET_TYPE: API_KEY SEVERITY: CRITICAL REMEDIATION: Revoke API key and use environment variables or secrets manager
Analyze this code for exposed secrets and security vulnerabilities
import pytest # FIXME: Using prod credentials in tests! TEST_DB = "postgresql://admin:Pj6m7P07Cz1r@prod.db.internal:5432/maindb" TEST_API_KEY = "sk-proj-SZhxDIhToqIRznIb4PebXsnhgBQj6zNGVUOH2rm2k6ynwVWZ" @pytest.fixture def db_connection(): return create_connection(TEST_DB)
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/TFtTdqTCN/BFEnZiasS/qgkCo1HVoO1BxunWB8orR0ci" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os import boto3 # Load from environment AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID') AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY') s3 = boto3.client('s3', aws_access_key_id=AWS_KEY, aws_secret_access_key=AWS_SECRET )
CLASSIFICATION: EXPOSED SECRET_TYPE: API_KEY SEVERITY: CRITICAL REMEDIATION: Revoke API key and use environment variables or secrets manager
Analyze this code for exposed secrets and security vulnerabilities
import pytest # FIXME: Using prod credentials in tests! TEST_DB = "postgresql://admin:9lOuVBgze8Vh@prod.db.internal:5432/maindb" TEST_API_KEY = "sk-proj-ud9Izfhwkc3SACmQKBdxQ4u2IUTwfQ4SlnSztzXjAlFDl7RQ" @pytest.fixture def db_connection(): return create_connection(TEST_DB)
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
resource "aws_db_instance" "prod" { username = "admin" password = "jvrXdfPGjtt4gopI" # TODO: Move to secrets manager } provider "aws" { access_key = "AKIAN2PEKM2VXFL4IBHM" secret_key = "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" }
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
DATABASE_URL=postgresql://admin:C98EmN3MyaBM@prod-db.company.com:5432/maindb STRIPE_SECRET_KEY=sk_live_z5bFPyAJ7qCMxtHxBYPn3W52 OPENAI_API_KEY=sk-proj-kA8g6Q0IbzBBt4BmxOQ9JMGaOC9zMk203Dtm5lmzlgkP9Wh1 AWS_ACCESS_KEY_ID=AKIAQ6G0CA9G3Y5NN1EE
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
const config = { apiEndpoint: 'https://api.example.com', githubToken: 'ghp_cv2XrXmSkVZPpB3djRm3r8HQqeQbIDQl9XeU', stripeKey: 'sk_live_9inMS5sKIXlmx6TIrrzYcxC8' }; module.exports = config;
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import boto3 import json def get_db_credentials(): client = boto3.client('secretsmanager') response = client.get_secret_value(SecretId='prod/db/creds') return json.loads(response['SecretString']) creds = get_db_credentials()
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
public class Config { public static final String API_KEY = "AIzaFn35vnoZZ0gUT1G26wPqoiDhLVBeYkO1aOv"; public static final String DB_PASSWORD = "V9pJdIIXz4iUEE29"; public static final String AWS_KEY = "AKIA6PNKR39OTCPYP24C"; }
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
resource "aws_db_instance" "prod" { username = "admin" password = "EZdXtA8NLeJF7Ch7" # TODO: Move to secrets manager } provider "aws" { access_key = "AKIAPLUI1CMEKEPK5SCO" secret_key = "7HKJdfIPEbqkI11IUmoV6ZWmLuSRZUxIzGfTp3L1" }
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - run: | curl -H "Authorization: Bearer ghp_Wq41Rwfh3sxH5sppJrXsQe8Hnx2XrA3ON9oh" \ https://api.github.com/user/repos
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/TgiqEPdOB/BNaZGesZr/zQQkbQGPC2GOgP6gKJoqIFAY" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os import boto3 # Load from environment AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID') AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY') s3 = boto3.client('s3', aws_access_key_id=AWS_KEY, aws_secret_access_key=AWS_SECRET )
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import boto3 import json def get_db_credentials(): client = boto3.client('secretsmanager') response = client.get_secret_value(SecretId='prod/db/creds') return json.loads(response['SecretString']) creds = get_db_credentials()
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - run: | curl -H "Authorization: Bearer ghp_Bb52ZXMJKqLYy97ZTsiQxWJ9lOIuQTcGQOFo" \ https://api.github.com/user/repos
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
const mongoose = require('mongoose'); mongoose.connect('mongodb://admin:Vq330E4MXePH@prod-mongo.company.com:27017/appdb', { useNewUrlParser: true, useUnifiedTopology: true });
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
require('dotenv').config(); const config = { apiKey: process.env.API_KEY, dbUrl: process.env.DATABASE_URL }; if (!config.apiKey) { throw new Error('API_KEY required'); }
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import boto3 import json def get_db_credentials(): client = boto3.client('secretsmanager') response = client.get_secret_value(SecretId='prod/db/creds') return json.loads(response['SecretString']) creds = get_db_credentials()
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
import boto3 # AWS Configuration AWS_ACCESS_KEY_ID = "AKIAK46UUO8MWKNAHYRI" AWS_SECRET_ACCESS_KEY = "nOdp2S0bo80zZZBtv1xS9YVLGPUxOPWlGP4ZRqHJ" s3 = boto3.client('s3', aws_access_key_id=AWS_ACCESS_KEY_ID, aws_secret_access_key=AWS_SECRET_ACCESS_KEY )
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: env_file: .env # .env is in .gitignore environment: - NODE_ENV=production
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:1tFjElHP3dvP@db:3306/app - JWT_SECRET=ZC7HsQJEMMJ6rGx1WMAUPFOuXabZm9aA ports: - "8080:8080"
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
# .env.example - Template only, no real secrets DATABASE_URL=postgresql://user:password@localhost:5432/db STRIPE_KEY=sk_test_YOUR_KEY_HERE OPENAI_API_KEY=your-api-key-here
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - run: | curl -H "Authorization: Bearer ghp_DTpZMTkU5zIZr6RJOyRpABmwEJ2Ra2wDYOzu" \ https://api.github.com/user/repos
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/TRcjghPTI/B2vrq7Sp5/OeuYVC62hxsmG27sZaWjdmiM" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os import boto3 # Load from environment AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID') AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY') s3 = boto3.client('s3', aws_access_key_id=AWS_KEY, aws_secret_access_key=AWS_SECRET )
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
public class Config { private static final String API_KEY = System.getenv("API_KEY"); static { if (API_KEY == null) { throw new RuntimeException("API_KEY not set"); } } }
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - name: Deploy env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} run: | curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \ https://api.github.com
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os import boto3 # Load from environment AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID') AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY') s3 = boto3.client('s3', aws_access_key_id=AWS_KEY, aws_secret_access_key=AWS_SECRET )
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
resource "aws_db_instance" "prod" { username = "admin" password = "bti1QXrpFeFknG6O" # TODO: Move to secrets manager } provider "aws" { access_key = "AKIAJJTNOVTFMNORQIGI" secret_key = "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" }
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - name: Deploy env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} run: | curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \ https://api.github.com
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
# .env.example - Template only, no real secrets DATABASE_URL=postgresql://user:password@localhost:5432/db STRIPE_KEY=sk_test_YOUR_KEY_HERE OPENAI_API_KEY=your-api-key-here
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - run: | curl -H "Authorization: Bearer ghp_DX1IvC05acIT1fuDoBKISvg1H1wB0NTvxe97" \ https://api.github.com/user/repos
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
DATABASE_URL=postgresql://admin:btlmRMerc6DH@prod-db.company.com:5432/maindb STRIPE_SECRET_KEY=sk_live_0DwCaNtLJODvXffjlcRK2auB OPENAI_API_KEY=sk-proj-nw22SxxC177QXSC3OAcFYv775byT6DeA183y5a5sbOpxjJUY AWS_ACCESS_KEY_ID=AKIADUUCAGZHVGQLPUUF
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:U5BUBkPdEF6I@db:3306/app - JWT_SECRET=JsFKiY3SWSwpcMFRgTKa6qMY0fQXiLj4 ports: - "8080:8080"
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - name: Deploy env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} run: | curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \ https://api.github.com
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: env_file: .env # .env is in .gitignore environment: - NODE_ENV=production
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import boto3 import json def get_db_credentials(): client = boto3.client('secretsmanager') response = client.get_secret_value(SecretId='prod/db/creds') return json.loads(response['SecretString']) creds = get_db_credentials()
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:g5QdFHb1WVkz@db:3306/app - JWT_SECRET=5xjk6zmEtSUepmWhXP84NgsatXgmtrLM ports: - "8080:8080"
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os from typing import Optional class Settings: DATABASE_URL: str = os.getenv('DATABASE_URL') SECRET_KEY: str = os.getenv('SECRET_KEY') def __init__(self): if not self.DATABASE_URL: raise ValueError('DATABASE_URL required')
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:xt3Q7JHPNZXK@db:3306/app - JWT_SECRET=LdjHQiRtwnpT32qu9aluMPJG2bX9BBkU ports: - "8080:8080"
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - name: Deploy env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} run: | curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \ https://api.github.com
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - run: | curl -H "Authorization: Bearer ghp_eeG4bLTsI0Sw5q0exA1NWP5bt3HzZJUJWr2m" \ https://api.github.com/user/repos
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
DATABASE_URL=postgresql://admin:U6PXO1xXNjuX@prod-db.company.com:5432/maindb STRIPE_SECRET_KEY=sk_live_S2q1uQndYV6d43AltcmS0bmG OPENAI_API_KEY=sk-proj-oBbxNQjyJbX5Hd78tHukfs0krnZKYjEuU5vjd9nYPy6E2nAw AWS_ACCESS_KEY_ID=AKIAST9ZA0GDRIM6OATO
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:4JQeBwX28j8M@db:3306/app - JWT_SECRET=ElZfDDs43Y2BBp8ZEHSitvkkJ4As0TEl ports: - "8080:8080"
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
import boto3 # AWS Configuration AWS_ACCESS_KEY_ID = "AKIA1HZLHIQ7BASBYYGS" AWS_SECRET_ACCESS_KEY = "TlVVIwToYlBj8ETQffCvRGMzuRhxMG2X0OKfrxEr" s3 = boto3.client('s3', aws_access_key_id=AWS_ACCESS_KEY_ID, aws_secret_access_key=AWS_SECRET_ACCESS_KEY )
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
const config = { apiEndpoint: 'https://api.example.com', githubToken: 'ghp_JEl8ny2TXiDiknfJBeSQwA2xQ4TR0oWnpZbi', stripeKey: 'sk_live_Qv74IQgLkOeZcd5yWL2SryIy' }; module.exports = config;
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
const config = { apiEndpoint: 'https://api.example.com', githubToken: 'ghp_8r4sGVd96WYL78dOdGnxZTuEsYEitGKTTuQa', stripeKey: 'sk_live_S7jySNY18wGAk9eRRREJyWij' }; module.exports = config;
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:G05YA5iB0wMQ@db:3306/app - JWT_SECRET=wq71YrWpDQFffDUeDmidhlSrS02nzoj6 ports: - "8080:8080"
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
const mongoose = require('mongoose'); mongoose.connect('mongodb://admin:38iCU3R0LEK2@prod-mongo.company.com:27017/appdb', { useNewUrlParser: true, useUnifiedTopology: true });
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
DATABASE_URL=postgresql://admin:vGt7gXvNHcbR@prod-db.company.com:5432/maindb STRIPE_SECRET_KEY=sk_live_PrNvMzQAn6tTpenCFbrSwjyW OPENAI_API_KEY=sk-proj-EahxoRF0dLxVjdqGpaB9DQUfE2yBJFjgtzlJSnMeonzLiB8L AWS_ACCESS_KEY_ID=AKIABZAOLVM4F2L1BVPQ
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
public class Config { private static final String API_KEY = System.getenv("API_KEY"); static { if (API_KEY == null) { throw new RuntimeException("API_KEY not set"); } } }
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os from typing import Optional class Settings: DATABASE_URL: str = os.getenv('DATABASE_URL') SECRET_KEY: str = os.getenv('SECRET_KEY') def __init__(self): if not self.DATABASE_URL: raise ValueError('DATABASE_URL required')
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
const config = { apiEndpoint: 'https://api.example.com', githubToken: 'ghp_LlGgf37OSXweoWRRamkZhmQ1sepfroBHlRT1', stripeKey: 'sk_live_bHYMziDMVnQsJQ7inyPYiklx' }; module.exports = config;
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
const config = { apiEndpoint: 'https://api.example.com', githubToken: 'ghp_MnR9B1RkGj6p43r0CIsC8mSuuGW1n7thHnZs', stripeKey: 'sk_live_sBI81cS7JyDRcN3Z7cbR1fxG' }; module.exports = config;
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
resource "aws_db_instance" "prod" { username = "admin" password = "ByYAq36Ki4NArSbw" # TODO: Move to secrets manager } provider "aws" { access_key = "AKIA4KTAOZXQIMWM80GD" secret_key = "mVhHdIWu4uJdCFFJJVmohm89EXOuOntRAYHc9L5a" }
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
resource "aws_db_instance" "prod" { username = "admin" password = "H9Fdsko9NHmqchok" # TODO: Move to secrets manager } provider "aws" { access_key = "AKIAI0IAP6TZEW5TVEJI" secret_key = "TkCjhHYYqJDMp79tbFQoPKylKw9tjqKayXnVH0Uy" }
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
DATABASE_URL=postgresql://admin:VirqVwRQzx0W@prod-db.company.com:5432/maindb STRIPE_SECRET_KEY=sk_live_ukTUdE73IFqsrBdKtK0TZRnA OPENAI_API_KEY=sk-proj-XO5Cuf4bHwudlKHTQysaoKqAFZ4HChYoIWLJsTK017wGtEPm AWS_ACCESS_KEY_ID=AKIAGXGNBB4QOWLKUPTQ
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
resource "aws_db_instance" "prod" { username = "admin" password = "UDiQuWuxkkzFPzSC" # TODO: Move to secrets manager } provider "aws" { access_key = "AKIAZQDXQUTPVGX1MOFC" secret_key = "H3p4o3AmsCA48HVZV9Lm83m2pnHYXQEMTcscIlLn" }
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
public class Config { public static final String API_KEY = "AIzazXr2PavE9OPwnU7yZbPeJ9tOJ88FM0nplCl"; public static final String DB_PASSWORD = "1IxIjTG3GXNqfvcj"; public static final String AWS_KEY = "AKIAGBSO7LFHVCZXMBV3"; }
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
resource "aws_db_instance" "prod" { username = "admin" password = "ouLCZSUO7vtm0b5e" # TODO: Move to secrets manager } provider "aws" { access_key = "AKIAJPOSBKBP5S0QRS9R" secret_key = "u6RkeaUoCdN1CdExcHYiZmdYADskA8eIVdp2pQhk" }
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/T36P52jpx/BQjSFZRks/ac9L2AJdzqYtaCPD9xaahhv8" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - run: | curl -H "Authorization: Bearer ghp_OpmTHUVFvAtplj2Gn5qzgA1q8bfClUg8dEqX" \ https://api.github.com/user/repos
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:WwBe5xVqby7v@db:3306/app - JWT_SECRET=iskN400H6N3LrOgD4kTgc91NX7TShybk ports: - "8080:8080"
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: env_file: .env # .env is in .gitignore environment: - NODE_ENV=production
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:tr4TsumWZ2Ko@db:3306/app - JWT_SECRET=TIv4Cb0u060vqcNyKRgtX5g9RD3pkWth ports: - "8080:8080"
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/TVZ8sYpYc/BobfjaPzW/RVABkssJWLgHBtQQC0yjAakK" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
DATABASE_URL=postgresql://admin:inK57lLU1fkZ@prod-db.company.com:5432/maindb STRIPE_SECRET_KEY=sk_live_tGYF3PNGFYrbQST0ZTTGWaE7 OPENAI_API_KEY=sk-proj-j2rZS19SkSAx9XlLrPHoJLvW6gny5N4mgNe4LPRV6vV5iGzG AWS_ACCESS_KEY_ID=AKIAPG36B6CYLCB5ADXK
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/Tnm2thZGV/BBdPt6lMU/nLzh8mCFIegLUfrqS0aq67QN" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
name: Deploy on: [push] jobs: deploy: runs-on: ubuntu-latest steps: - name: Deploy env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} run: | curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \ https://api.github.com
CLASSIFICATION: EXPOSED SECRET_TYPE: API_KEY SEVERITY: CRITICAL REMEDIATION: Revoke API key and use environment variables or secrets manager
Analyze this code for exposed secrets and security vulnerabilities
import pytest # FIXME: Using prod credentials in tests! TEST_DB = "postgresql://admin:iCkW4uRsak8g@prod.db.internal:5432/maindb" TEST_API_KEY = "sk-proj-e0Hufx2UK2ma9bQ0yoxfiVTYuGWLudghuQ76KxkSlN4EEETL" @pytest.fixture def db_connection(): return create_connection(TEST_DB)
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
resource "aws_db_instance" "prod" { username = "admin" password = "KtBFBJPQ4Gj9BwBK" # TODO: Move to secrets manager } provider "aws" { access_key = "AKIATNX7EMNUCQPGRLBO" secret_key = "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" }
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os from typing import Optional class Settings: DATABASE_URL: str = os.getenv('DATABASE_URL') SECRET_KEY: str = os.getenv('SECRET_KEY') def __init__(self): if not self.DATABASE_URL: raise ValueError('DATABASE_URL required')
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
DATABASE_URL=postgresql://admin:TEvQVwXNYr3B@prod-db.company.com:5432/maindb STRIPE_SECRET_KEY=sk_live_fVkdT8wfi3SxodRmwnexoCTO OPENAI_API_KEY=sk-proj-j5haCj8C0IszovtvrptgWRIJwa5mU4EhZTqV7LWoAB7nndLP AWS_ACCESS_KEY_ID=AKIAC5M8WCLG27BGXXB6
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
const mongoose = require('mongoose'); mongoose.connect('mongodb://admin:xpirgXPq6X9X@prod-mongo.company.com:27017/appdb', { useNewUrlParser: true, useUnifiedTopology: true });
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/TiQoocycF/BfUGVtU8o/GjKQ1cPB5YWool2y95jicX5L" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import boto3 import json def get_db_credentials(): client = boto3.client('secretsmanager') response = client.get_secret_value(SecretId='prod/db/creds') return json.loads(response['SecretString']) creds = get_db_credentials()
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
const config = { apiEndpoint: 'https://api.example.com', githubToken: 'ghp_PayZjTZQq9QEdRsle5fcnfOJ0BnxNEVfglGm', stripeKey: 'sk_live_83th9GnRU8l7DiAGsvAD0ecg' }; module.exports = config;
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:tKlOrrMysIJ2@db:3306/app - JWT_SECRET=bhleDhQuwf0XjVwKSaMJNNeCLjMfnerH ports: - "8080:8080"
CLASSIFICATION: EXPOSED SECRET_TYPE: GITHUB_TOKEN SEVERITY: CRITICAL REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets
Analyze this code for exposed secrets and security vulnerabilities
const config = { apiEndpoint: 'https://api.example.com', githubToken: 'ghp_518BHUDwMjA8LdH5VDmiLvhaiwEht7befX3B', stripeKey: 'sk_live_kWtdKrKXoBe71LpQJWevOfYE' }; module.exports = config;
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os from typing import Optional class Settings: DATABASE_URL: str = os.getenv('DATABASE_URL') SECRET_KEY: str = os.getenv('SECRET_KEY') def __init__(self): if not self.DATABASE_URL: raise ValueError('DATABASE_URL required')
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
DATABASE_URL=postgresql://admin:qKYgv0lrAX1k@prod-db.company.com:5432/maindb STRIPE_SECRET_KEY=sk_live_7RkSvIY5jTdOaatrAmzefHE5 OPENAI_API_KEY=sk-proj-CB0Nvr6nWXq2PqPLiUfnbh5cdld7FkGJnUAyom3V6by3ggjD AWS_ACCESS_KEY_ID=AKIAEMISEX1UCA8QM9GD
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/TyUBozFIR/BXKv024bx/nuRXCqCWdS0TyVaTsqaQzlgB" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
const mongoose = require('mongoose'); mongoose.connect('mongodb://admin:RWj7kn8l7sw2@prod-mongo.company.com:27017/appdb', { useNewUrlParser: true, useUnifiedTopology: true });
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: env_file: .env # .env is in .gitignore environment: - NODE_ENV=production
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
const mongoose = require('mongoose'); mongoose.connect('mongodb://admin:wuSblWyZZwdI@prod-mongo.company.com:27017/appdb', { useNewUrlParser: true, useUnifiedTopology: true });
CLASSIFICATION: EXPOSED SECRET_TYPE: API_KEY SEVERITY: CRITICAL REMEDIATION: Revoke API key and use environment variables or secrets manager
Analyze this code for exposed secrets and security vulnerabilities
import pytest # FIXME: Using prod credentials in tests! TEST_DB = "postgresql://admin:XFGICPuPpZ5g@prod.db.internal:5432/maindb" TEST_API_KEY = "sk-proj-uClYVaE3Bdjec1zTDGilVf58qnpyG81KDFqtG5Hai5d6XtGq" @pytest.fixture def db_connection(): return create_connection(TEST_DB)
CLASSIFICATION: EXPOSED SECRET_TYPE: API_KEY SEVERITY: CRITICAL REMEDIATION: Revoke API key and use environment variables or secrets manager
Analyze this code for exposed secrets and security vulnerabilities
import pytest # FIXME: Using prod credentials in tests! TEST_DB = "postgresql://admin:C885BUzPqTlJ@prod.db.internal:5432/maindb" TEST_API_KEY = "sk-proj-LkTTeuFhyKxkgkzXUHLhmZlOeE8k2yHlzRMriw9RYjUXb5B6" @pytest.fixture def db_connection(): return create_connection(TEST_DB)
CLASSIFICATION: SAFE SECRET_TYPE: NONE SEVERITY: NONE REMEDIATION: None needed - following security best practices
Analyze this code for exposed secrets and security vulnerabilities
import os import boto3 # Load from environment AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID') AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY') s3 = boto3.client('s3', aws_access_key_id=AWS_KEY, aws_secret_access_key=AWS_SECRET )
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:dWP8wvahzlI0@db:3306/app - JWT_SECRET=U1NljyNh5jpmAE9xnREwkSuJqOfiwsSi ports: - "8080:8080"
CLASSIFICATION: EXPOSED SECRET_TYPE: DB_PASSWORD SEVERITY: CRITICAL REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager
Analyze this code for exposed secrets and security vulnerabilities
version: '3.8' services: web: image: myapp:latest environment: - DATABASE_URL=mysql://root:DGd5rmWLCCkW@db:3306/app - JWT_SECRET=uGWeXCNqRfsSXRGP0AIEU1jPQ1aeuEfS ports: - "8080:8080"
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
DATABASE_URL=postgresql://admin:VwnBYVwITIHE@prod-db.company.com:5432/maindb STRIPE_SECRET_KEY=sk_live_HdQyWnN1l627ldTwnAD6Kuxr OPENAI_API_KEY=sk-proj-yoMFH3J1iB1NgSGybuWEZtqqC2vp1vTY1t4pHqcQJtZPF7rd AWS_ACCESS_KEY_ID=AKIA6YHLS6WAEEP0UGYN
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
public class Config { public static final String API_KEY = "AIzaPgcpgNygWfrzBv6g62dGCT4nA5KkydByxhz"; public static final String DB_PASSWORD = "zie9fA2di9HHbepT"; public static final String AWS_KEY = "AKIAEIYUMVBTSHVV7I7M"; }
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
resource "aws_db_instance" "prod" { username = "admin" password = "E6wjCAoJlAcY8G25" # TODO: Move to secrets manager } provider "aws" { access_key = "AKIAYUPML9NGOPOXTNMO" secret_key = "fYx2oQthH13VA13e2K5Te9CW5iHfxpDBL24jidjI" }
CLASSIFICATION: EXPOSED SECRET_TYPE: AWS_ACCESS_KEY SEVERITY: CRITICAL REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles
Analyze this code for exposed secrets and security vulnerabilities
import boto3 # AWS Configuration AWS_ACCESS_KEY_ID = "AKIAQDKW82IAX9KLAQCW" AWS_SECRET_ACCESS_KEY = "6myyG0wRSMfcKgMofTDf6NcuZu1b5ogqVWDvchFp" s3 = boto3.client('s3', aws_access_key_id=AWS_ACCESS_KEY_ID, aws_secret_access_key=AWS_SECRET_ACCESS_KEY )
CLASSIFICATION: EXPOSED SECRET_TYPE: SLACK_WEBHOOK SEVERITY: CRITICAL REMEDIATION: Regenerate webhook in Slack settings and use environment variables
Analyze this code for exposed secrets and security vulnerabilities
import requests # TODO: Move this to environment variables before deploying! SLACK_WEBHOOK = "https://hooks.slack.com/services/TJ7oO7FMn/BfRcWZUoC/p2JYk2JP1jgBJbIgp8WWrhXp" def send_alert(msg): requests.post(SLACK_WEBHOOK, json={"text": msg})
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
5