answer stringclasses 6 values | question stringclasses 1 value | context stringlengths 120 279 |
|---|---|---|
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | # .env.example - Template only, no real secrets
DATABASE_URL=postgresql://user:password@localhost:5432/db
STRIPE_KEY=sk_test_YOUR_KEY_HERE
OPENAI_API_KEY=your-api-key-here |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/THeBCYaTR/BcfPwLwf2/7hA3KNKbhbHkRFAHeAbWMA5g"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/TovcRhi8Z/Bgn7CSzTs/wF02GKV31v9iGqk37zrO9wog"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
from typing import Optional
class Settings:
DATABASE_URL: str = os.getenv('DATABASE_URL')
SECRET_KEY: str = os.getenv('SECRET_KEY')
def __init__(self):
if not self.DATABASE_URL:
raise ValueError('DATABASE_URL required') |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:0kmmKs8zsP4Q@db:3306/app
- JWT_SECRET=wsz5DFiPeElKAZUJGQqgXKfElTMhIyqE
ports:
- "8080:8080" |
CLASSIFICATION: EXPOSED
SECRET_TYPE: API_KEY
SEVERITY: CRITICAL
REMEDIATION: Revoke API key and use environment variables or secrets manager | Analyze this code for exposed secrets and security vulnerabilities | import pytest
# FIXME: Using prod credentials in tests!
TEST_DB = "postgresql://admin:Pj6m7P07Cz1r@prod.db.internal:5432/maindb"
TEST_API_KEY = "sk-proj-SZhxDIhToqIRznIb4PebXsnhgBQj6zNGVUOH2rm2k6ynwVWZ"
@pytest.fixture
def db_connection():
return create_connection(TEST_DB) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/TFtTdqTCN/BFEnZiasS/qgkCo1HVoO1BxunWB8orR0ci"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
import boto3
# Load from environment
AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID')
AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY')
s3 = boto3.client('s3',
aws_access_key_id=AWS_KEY,
aws_secret_access_key=AWS_SECRET
) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: API_KEY
SEVERITY: CRITICAL
REMEDIATION: Revoke API key and use environment variables or secrets manager | Analyze this code for exposed secrets and security vulnerabilities | import pytest
# FIXME: Using prod credentials in tests!
TEST_DB = "postgresql://admin:9lOuVBgze8Vh@prod.db.internal:5432/maindb"
TEST_API_KEY = "sk-proj-ud9Izfhwkc3SACmQKBdxQ4u2IUTwfQ4SlnSztzXjAlFDl7RQ"
@pytest.fixture
def db_connection():
return create_connection(TEST_DB) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | resource "aws_db_instance" "prod" {
username = "admin"
password = "jvrXdfPGjtt4gopI" # TODO: Move to secrets manager
}
provider "aws" {
access_key = "AKIAN2PEKM2VXFL4IBHM"
secret_key = "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"
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | DATABASE_URL=postgresql://admin:C98EmN3MyaBM@prod-db.company.com:5432/maindb
STRIPE_SECRET_KEY=sk_live_z5bFPyAJ7qCMxtHxBYPn3W52
OPENAI_API_KEY=sk-proj-kA8g6Q0IbzBBt4BmxOQ9JMGaOC9zMk203Dtm5lmzlgkP9Wh1
AWS_ACCESS_KEY_ID=AKIAQ6G0CA9G3Y5NN1EE |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | const config = {
apiEndpoint: 'https://api.example.com',
githubToken: 'ghp_cv2XrXmSkVZPpB3djRm3r8HQqeQbIDQl9XeU',
stripeKey: 'sk_live_9inMS5sKIXlmx6TIrrzYcxC8'
};
module.exports = config; |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import boto3
import json
def get_db_credentials():
client = boto3.client('secretsmanager')
response = client.get_secret_value(SecretId='prod/db/creds')
return json.loads(response['SecretString'])
creds = get_db_credentials() |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | public class Config {
public static final String API_KEY = "AIzaFn35vnoZZ0gUT1G26wPqoiDhLVBeYkO1aOv";
public static final String DB_PASSWORD = "V9pJdIIXz4iUEE29";
public static final String AWS_KEY = "AKIA6PNKR39OTCPYP24C";
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | resource "aws_db_instance" "prod" {
username = "admin"
password = "EZdXtA8NLeJF7Ch7" # TODO: Move to secrets manager
}
provider "aws" {
access_key = "AKIAPLUI1CMEKEPK5SCO"
secret_key = "7HKJdfIPEbqkI11IUmoV6ZWmLuSRZUxIzGfTp3L1"
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- run: |
curl -H "Authorization: Bearer ghp_Wq41Rwfh3sxH5sppJrXsQe8Hnx2XrA3ON9oh" \
https://api.github.com/user/repos |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/TgiqEPdOB/BNaZGesZr/zQQkbQGPC2GOgP6gKJoqIFAY"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
import boto3
# Load from environment
AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID')
AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY')
s3 = boto3.client('s3',
aws_access_key_id=AWS_KEY,
aws_secret_access_key=AWS_SECRET
) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import boto3
import json
def get_db_credentials():
client = boto3.client('secretsmanager')
response = client.get_secret_value(SecretId='prod/db/creds')
return json.loads(response['SecretString'])
creds = get_db_credentials() |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- run: |
curl -H "Authorization: Bearer ghp_Bb52ZXMJKqLYy97ZTsiQxWJ9lOIuQTcGQOFo" \
https://api.github.com/user/repos |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | const mongoose = require('mongoose');
mongoose.connect('mongodb://admin:Vq330E4MXePH@prod-mongo.company.com:27017/appdb', {
useNewUrlParser: true,
useUnifiedTopology: true
}); |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | require('dotenv').config();
const config = {
apiKey: process.env.API_KEY,
dbUrl: process.env.DATABASE_URL
};
if (!config.apiKey) {
throw new Error('API_KEY required');
} |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import boto3
import json
def get_db_credentials():
client = boto3.client('secretsmanager')
response = client.get_secret_value(SecretId='prod/db/creds')
return json.loads(response['SecretString'])
creds = get_db_credentials() |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | import boto3
# AWS Configuration
AWS_ACCESS_KEY_ID = "AKIAK46UUO8MWKNAHYRI"
AWS_SECRET_ACCESS_KEY = "nOdp2S0bo80zZZBtv1xS9YVLGPUxOPWlGP4ZRqHJ"
s3 = boto3.client('s3',
aws_access_key_id=AWS_ACCESS_KEY_ID,
aws_secret_access_key=AWS_SECRET_ACCESS_KEY
) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
env_file: .env # .env is in .gitignore
environment:
- NODE_ENV=production |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:1tFjElHP3dvP@db:3306/app
- JWT_SECRET=ZC7HsQJEMMJ6rGx1WMAUPFOuXabZm9aA
ports:
- "8080:8080" |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | # .env.example - Template only, no real secrets
DATABASE_URL=postgresql://user:password@localhost:5432/db
STRIPE_KEY=sk_test_YOUR_KEY_HERE
OPENAI_API_KEY=your-api-key-here |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- run: |
curl -H "Authorization: Bearer ghp_DTpZMTkU5zIZr6RJOyRpABmwEJ2Ra2wDYOzu" \
https://api.github.com/user/repos |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/TRcjghPTI/B2vrq7Sp5/OeuYVC62hxsmG27sZaWjdmiM"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
import boto3
# Load from environment
AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID')
AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY')
s3 = boto3.client('s3',
aws_access_key_id=AWS_KEY,
aws_secret_access_key=AWS_SECRET
) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | public class Config {
private static final String API_KEY = System.getenv("API_KEY");
static {
if (API_KEY == null) {
throw new RuntimeException("API_KEY not set");
}
}
} |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- name: Deploy
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \
https://api.github.com |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
import boto3
# Load from environment
AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID')
AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY')
s3 = boto3.client('s3',
aws_access_key_id=AWS_KEY,
aws_secret_access_key=AWS_SECRET
) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | resource "aws_db_instance" "prod" {
username = "admin"
password = "bti1QXrpFeFknG6O" # TODO: Move to secrets manager
}
provider "aws" {
access_key = "AKIAJJTNOVTFMNORQIGI"
secret_key = "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"
} |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- name: Deploy
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \
https://api.github.com |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | # .env.example - Template only, no real secrets
DATABASE_URL=postgresql://user:password@localhost:5432/db
STRIPE_KEY=sk_test_YOUR_KEY_HERE
OPENAI_API_KEY=your-api-key-here |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- run: |
curl -H "Authorization: Bearer ghp_DX1IvC05acIT1fuDoBKISvg1H1wB0NTvxe97" \
https://api.github.com/user/repos |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | DATABASE_URL=postgresql://admin:btlmRMerc6DH@prod-db.company.com:5432/maindb
STRIPE_SECRET_KEY=sk_live_0DwCaNtLJODvXffjlcRK2auB
OPENAI_API_KEY=sk-proj-nw22SxxC177QXSC3OAcFYv775byT6DeA183y5a5sbOpxjJUY
AWS_ACCESS_KEY_ID=AKIADUUCAGZHVGQLPUUF |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:U5BUBkPdEF6I@db:3306/app
- JWT_SECRET=JsFKiY3SWSwpcMFRgTKa6qMY0fQXiLj4
ports:
- "8080:8080" |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- name: Deploy
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \
https://api.github.com |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
env_file: .env # .env is in .gitignore
environment:
- NODE_ENV=production |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import boto3
import json
def get_db_credentials():
client = boto3.client('secretsmanager')
response = client.get_secret_value(SecretId='prod/db/creds')
return json.loads(response['SecretString'])
creds = get_db_credentials() |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:g5QdFHb1WVkz@db:3306/app
- JWT_SECRET=5xjk6zmEtSUepmWhXP84NgsatXgmtrLM
ports:
- "8080:8080" |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
from typing import Optional
class Settings:
DATABASE_URL: str = os.getenv('DATABASE_URL')
SECRET_KEY: str = os.getenv('SECRET_KEY')
def __init__(self):
if not self.DATABASE_URL:
raise ValueError('DATABASE_URL required') |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:xt3Q7JHPNZXK@db:3306/app
- JWT_SECRET=LdjHQiRtwnpT32qu9aluMPJG2bX9BBkU
ports:
- "8080:8080" |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- name: Deploy
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \
https://api.github.com |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- run: |
curl -H "Authorization: Bearer ghp_eeG4bLTsI0Sw5q0exA1NWP5bt3HzZJUJWr2m" \
https://api.github.com/user/repos |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | DATABASE_URL=postgresql://admin:U6PXO1xXNjuX@prod-db.company.com:5432/maindb
STRIPE_SECRET_KEY=sk_live_S2q1uQndYV6d43AltcmS0bmG
OPENAI_API_KEY=sk-proj-oBbxNQjyJbX5Hd78tHukfs0krnZKYjEuU5vjd9nYPy6E2nAw
AWS_ACCESS_KEY_ID=AKIAST9ZA0GDRIM6OATO |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:4JQeBwX28j8M@db:3306/app
- JWT_SECRET=ElZfDDs43Y2BBp8ZEHSitvkkJ4As0TEl
ports:
- "8080:8080" |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | import boto3
# AWS Configuration
AWS_ACCESS_KEY_ID = "AKIA1HZLHIQ7BASBYYGS"
AWS_SECRET_ACCESS_KEY = "TlVVIwToYlBj8ETQffCvRGMzuRhxMG2X0OKfrxEr"
s3 = boto3.client('s3',
aws_access_key_id=AWS_ACCESS_KEY_ID,
aws_secret_access_key=AWS_SECRET_ACCESS_KEY
) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | const config = {
apiEndpoint: 'https://api.example.com',
githubToken: 'ghp_JEl8ny2TXiDiknfJBeSQwA2xQ4TR0oWnpZbi',
stripeKey: 'sk_live_Qv74IQgLkOeZcd5yWL2SryIy'
};
module.exports = config; |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | const config = {
apiEndpoint: 'https://api.example.com',
githubToken: 'ghp_8r4sGVd96WYL78dOdGnxZTuEsYEitGKTTuQa',
stripeKey: 'sk_live_S7jySNY18wGAk9eRRREJyWij'
};
module.exports = config; |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:G05YA5iB0wMQ@db:3306/app
- JWT_SECRET=wq71YrWpDQFffDUeDmidhlSrS02nzoj6
ports:
- "8080:8080" |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | const mongoose = require('mongoose');
mongoose.connect('mongodb://admin:38iCU3R0LEK2@prod-mongo.company.com:27017/appdb', {
useNewUrlParser: true,
useUnifiedTopology: true
}); |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | DATABASE_URL=postgresql://admin:vGt7gXvNHcbR@prod-db.company.com:5432/maindb
STRIPE_SECRET_KEY=sk_live_PrNvMzQAn6tTpenCFbrSwjyW
OPENAI_API_KEY=sk-proj-EahxoRF0dLxVjdqGpaB9DQUfE2yBJFjgtzlJSnMeonzLiB8L
AWS_ACCESS_KEY_ID=AKIABZAOLVM4F2L1BVPQ |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | public class Config {
private static final String API_KEY = System.getenv("API_KEY");
static {
if (API_KEY == null) {
throw new RuntimeException("API_KEY not set");
}
}
} |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
from typing import Optional
class Settings:
DATABASE_URL: str = os.getenv('DATABASE_URL')
SECRET_KEY: str = os.getenv('SECRET_KEY')
def __init__(self):
if not self.DATABASE_URL:
raise ValueError('DATABASE_URL required') |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | const config = {
apiEndpoint: 'https://api.example.com',
githubToken: 'ghp_LlGgf37OSXweoWRRamkZhmQ1sepfroBHlRT1',
stripeKey: 'sk_live_bHYMziDMVnQsJQ7inyPYiklx'
};
module.exports = config; |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | const config = {
apiEndpoint: 'https://api.example.com',
githubToken: 'ghp_MnR9B1RkGj6p43r0CIsC8mSuuGW1n7thHnZs',
stripeKey: 'sk_live_sBI81cS7JyDRcN3Z7cbR1fxG'
};
module.exports = config; |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | resource "aws_db_instance" "prod" {
username = "admin"
password = "ByYAq36Ki4NArSbw" # TODO: Move to secrets manager
}
provider "aws" {
access_key = "AKIA4KTAOZXQIMWM80GD"
secret_key = "mVhHdIWu4uJdCFFJJVmohm89EXOuOntRAYHc9L5a"
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | resource "aws_db_instance" "prod" {
username = "admin"
password = "H9Fdsko9NHmqchok" # TODO: Move to secrets manager
}
provider "aws" {
access_key = "AKIAI0IAP6TZEW5TVEJI"
secret_key = "TkCjhHYYqJDMp79tbFQoPKylKw9tjqKayXnVH0Uy"
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | DATABASE_URL=postgresql://admin:VirqVwRQzx0W@prod-db.company.com:5432/maindb
STRIPE_SECRET_KEY=sk_live_ukTUdE73IFqsrBdKtK0TZRnA
OPENAI_API_KEY=sk-proj-XO5Cuf4bHwudlKHTQysaoKqAFZ4HChYoIWLJsTK017wGtEPm
AWS_ACCESS_KEY_ID=AKIAGXGNBB4QOWLKUPTQ |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | resource "aws_db_instance" "prod" {
username = "admin"
password = "UDiQuWuxkkzFPzSC" # TODO: Move to secrets manager
}
provider "aws" {
access_key = "AKIAZQDXQUTPVGX1MOFC"
secret_key = "H3p4o3AmsCA48HVZV9Lm83m2pnHYXQEMTcscIlLn"
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | public class Config {
public static final String API_KEY = "AIzazXr2PavE9OPwnU7yZbPeJ9tOJ88FM0nplCl";
public static final String DB_PASSWORD = "1IxIjTG3GXNqfvcj";
public static final String AWS_KEY = "AKIAGBSO7LFHVCZXMBV3";
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | resource "aws_db_instance" "prod" {
username = "admin"
password = "ouLCZSUO7vtm0b5e" # TODO: Move to secrets manager
}
provider "aws" {
access_key = "AKIAJPOSBKBP5S0QRS9R"
secret_key = "u6RkeaUoCdN1CdExcHYiZmdYADskA8eIVdp2pQhk"
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/T36P52jpx/BQjSFZRks/ac9L2AJdzqYtaCPD9xaahhv8"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- run: |
curl -H "Authorization: Bearer ghp_OpmTHUVFvAtplj2Gn5qzgA1q8bfClUg8dEqX" \
https://api.github.com/user/repos |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:WwBe5xVqby7v@db:3306/app
- JWT_SECRET=iskN400H6N3LrOgD4kTgc91NX7TShybk
ports:
- "8080:8080" |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
env_file: .env # .env is in .gitignore
environment:
- NODE_ENV=production |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:tr4TsumWZ2Ko@db:3306/app
- JWT_SECRET=TIv4Cb0u060vqcNyKRgtX5g9RD3pkWth
ports:
- "8080:8080" |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/TVZ8sYpYc/BobfjaPzW/RVABkssJWLgHBtQQC0yjAakK"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | DATABASE_URL=postgresql://admin:inK57lLU1fkZ@prod-db.company.com:5432/maindb
STRIPE_SECRET_KEY=sk_live_tGYF3PNGFYrbQST0ZTTGWaE7
OPENAI_API_KEY=sk-proj-j2rZS19SkSAx9XlLrPHoJLvW6gny5N4mgNe4LPRV6vV5iGzG
AWS_ACCESS_KEY_ID=AKIAPG36B6CYLCB5ADXK |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/Tnm2thZGV/BBdPt6lMU/nLzh8mCFIegLUfrqS0aq67QN"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | name: Deploy
on: [push]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- name: Deploy
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
curl -H "Authorization: Bearer ${GITHUB_TOKEN}" \
https://api.github.com |
CLASSIFICATION: EXPOSED
SECRET_TYPE: API_KEY
SEVERITY: CRITICAL
REMEDIATION: Revoke API key and use environment variables or secrets manager | Analyze this code for exposed secrets and security vulnerabilities | import pytest
# FIXME: Using prod credentials in tests!
TEST_DB = "postgresql://admin:iCkW4uRsak8g@prod.db.internal:5432/maindb"
TEST_API_KEY = "sk-proj-e0Hufx2UK2ma9bQ0yoxfiVTYuGWLudghuQ76KxkSlN4EEETL"
@pytest.fixture
def db_connection():
return create_connection(TEST_DB) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | resource "aws_db_instance" "prod" {
username = "admin"
password = "KtBFBJPQ4Gj9BwBK" # TODO: Move to secrets manager
}
provider "aws" {
access_key = "AKIATNX7EMNUCQPGRLBO"
secret_key = "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"
} |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
from typing import Optional
class Settings:
DATABASE_URL: str = os.getenv('DATABASE_URL')
SECRET_KEY: str = os.getenv('SECRET_KEY')
def __init__(self):
if not self.DATABASE_URL:
raise ValueError('DATABASE_URL required') |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | DATABASE_URL=postgresql://admin:TEvQVwXNYr3B@prod-db.company.com:5432/maindb
STRIPE_SECRET_KEY=sk_live_fVkdT8wfi3SxodRmwnexoCTO
OPENAI_API_KEY=sk-proj-j5haCj8C0IszovtvrptgWRIJwa5mU4EhZTqV7LWoAB7nndLP
AWS_ACCESS_KEY_ID=AKIAC5M8WCLG27BGXXB6 |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | const mongoose = require('mongoose');
mongoose.connect('mongodb://admin:xpirgXPq6X9X@prod-mongo.company.com:27017/appdb', {
useNewUrlParser: true,
useUnifiedTopology: true
}); |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/TiQoocycF/BfUGVtU8o/GjKQ1cPB5YWool2y95jicX5L"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import boto3
import json
def get_db_credentials():
client = boto3.client('secretsmanager')
response = client.get_secret_value(SecretId='prod/db/creds')
return json.loads(response['SecretString'])
creds = get_db_credentials() |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | const config = {
apiEndpoint: 'https://api.example.com',
githubToken: 'ghp_PayZjTZQq9QEdRsle5fcnfOJ0BnxNEVfglGm',
stripeKey: 'sk_live_83th9GnRU8l7DiAGsvAD0ecg'
};
module.exports = config; |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:tKlOrrMysIJ2@db:3306/app
- JWT_SECRET=bhleDhQuwf0XjVwKSaMJNNeCLjMfnerH
ports:
- "8080:8080" |
CLASSIFICATION: EXPOSED
SECRET_TYPE: GITHUB_TOKEN
SEVERITY: CRITICAL
REMEDIATION: Revoke token at github.com/settings/tokens and use GitHub Secrets | Analyze this code for exposed secrets and security vulnerabilities | const config = {
apiEndpoint: 'https://api.example.com',
githubToken: 'ghp_518BHUDwMjA8LdH5VDmiLvhaiwEht7befX3B',
stripeKey: 'sk_live_kWtdKrKXoBe71LpQJWevOfYE'
};
module.exports = config; |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
from typing import Optional
class Settings:
DATABASE_URL: str = os.getenv('DATABASE_URL')
SECRET_KEY: str = os.getenv('SECRET_KEY')
def __init__(self):
if not self.DATABASE_URL:
raise ValueError('DATABASE_URL required') |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | DATABASE_URL=postgresql://admin:qKYgv0lrAX1k@prod-db.company.com:5432/maindb
STRIPE_SECRET_KEY=sk_live_7RkSvIY5jTdOaatrAmzefHE5
OPENAI_API_KEY=sk-proj-CB0Nvr6nWXq2PqPLiUfnbh5cdld7FkGJnUAyom3V6by3ggjD
AWS_ACCESS_KEY_ID=AKIAEMISEX1UCA8QM9GD |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/TyUBozFIR/BXKv024bx/nuRXCqCWdS0TyVaTsqaQzlgB"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | const mongoose = require('mongoose');
mongoose.connect('mongodb://admin:RWj7kn8l7sw2@prod-mongo.company.com:27017/appdb', {
useNewUrlParser: true,
useUnifiedTopology: true
}); |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
env_file: .env # .env is in .gitignore
environment:
- NODE_ENV=production |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | const mongoose = require('mongoose');
mongoose.connect('mongodb://admin:wuSblWyZZwdI@prod-mongo.company.com:27017/appdb', {
useNewUrlParser: true,
useUnifiedTopology: true
}); |
CLASSIFICATION: EXPOSED
SECRET_TYPE: API_KEY
SEVERITY: CRITICAL
REMEDIATION: Revoke API key and use environment variables or secrets manager | Analyze this code for exposed secrets and security vulnerabilities | import pytest
# FIXME: Using prod credentials in tests!
TEST_DB = "postgresql://admin:XFGICPuPpZ5g@prod.db.internal:5432/maindb"
TEST_API_KEY = "sk-proj-uClYVaE3Bdjec1zTDGilVf58qnpyG81KDFqtG5Hai5d6XtGq"
@pytest.fixture
def db_connection():
return create_connection(TEST_DB) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: API_KEY
SEVERITY: CRITICAL
REMEDIATION: Revoke API key and use environment variables or secrets manager | Analyze this code for exposed secrets and security vulnerabilities | import pytest
# FIXME: Using prod credentials in tests!
TEST_DB = "postgresql://admin:C885BUzPqTlJ@prod.db.internal:5432/maindb"
TEST_API_KEY = "sk-proj-LkTTeuFhyKxkgkzXUHLhmZlOeE8k2yHlzRMriw9RYjUXb5B6"
@pytest.fixture
def db_connection():
return create_connection(TEST_DB) |
CLASSIFICATION: SAFE
SECRET_TYPE: NONE
SEVERITY: NONE
REMEDIATION: None needed - following security best practices | Analyze this code for exposed secrets and security vulnerabilities | import os
import boto3
# Load from environment
AWS_KEY = os.environ.get('AWS_ACCESS_KEY_ID')
AWS_SECRET = os.environ.get('AWS_SECRET_ACCESS_KEY')
s3 = boto3.client('s3',
aws_access_key_id=AWS_KEY,
aws_secret_access_key=AWS_SECRET
) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:dWP8wvahzlI0@db:3306/app
- JWT_SECRET=U1NljyNh5jpmAE9xnREwkSuJqOfiwsSi
ports:
- "8080:8080" |
CLASSIFICATION: EXPOSED
SECRET_TYPE: DB_PASSWORD
SEVERITY: CRITICAL
REMEDIATION: Rotate database credentials and use environment variables or AWS Secrets Manager | Analyze this code for exposed secrets and security vulnerabilities | version: '3.8'
services:
web:
image: myapp:latest
environment:
- DATABASE_URL=mysql://root:DGd5rmWLCCkW@db:3306/app
- JWT_SECRET=uGWeXCNqRfsSXRGP0AIEU1jPQ1aeuEfS
ports:
- "8080:8080" |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | DATABASE_URL=postgresql://admin:VwnBYVwITIHE@prod-db.company.com:5432/maindb
STRIPE_SECRET_KEY=sk_live_HdQyWnN1l627ldTwnAD6Kuxr
OPENAI_API_KEY=sk-proj-yoMFH3J1iB1NgSGybuWEZtqqC2vp1vTY1t4pHqcQJtZPF7rd
AWS_ACCESS_KEY_ID=AKIA6YHLS6WAEEP0UGYN |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | public class Config {
public static final String API_KEY = "AIzaPgcpgNygWfrzBv6g62dGCT4nA5KkydByxhz";
public static final String DB_PASSWORD = "zie9fA2di9HHbepT";
public static final String AWS_KEY = "AKIAEIYUMVBTSHVV7I7M";
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | resource "aws_db_instance" "prod" {
username = "admin"
password = "E6wjCAoJlAcY8G25" # TODO: Move to secrets manager
}
provider "aws" {
access_key = "AKIAYUPML9NGOPOXTNMO"
secret_key = "fYx2oQthH13VA13e2K5Te9CW5iHfxpDBL24jidjI"
} |
CLASSIFICATION: EXPOSED
SECRET_TYPE: AWS_ACCESS_KEY
SEVERITY: CRITICAL
REMEDIATION: Rotate AWS credentials via IAM console and use environment variables or IAM roles | Analyze this code for exposed secrets and security vulnerabilities | import boto3
# AWS Configuration
AWS_ACCESS_KEY_ID = "AKIAQDKW82IAX9KLAQCW"
AWS_SECRET_ACCESS_KEY = "6myyG0wRSMfcKgMofTDf6NcuZu1b5ogqVWDvchFp"
s3 = boto3.client('s3',
aws_access_key_id=AWS_ACCESS_KEY_ID,
aws_secret_access_key=AWS_SECRET_ACCESS_KEY
) |
CLASSIFICATION: EXPOSED
SECRET_TYPE: SLACK_WEBHOOK
SEVERITY: CRITICAL
REMEDIATION: Regenerate webhook in Slack settings and use environment variables | Analyze this code for exposed secrets and security vulnerabilities | import requests
# TODO: Move this to environment variables before deploying!
SLACK_WEBHOOK = "https://hooks.slack.com/services/TJ7oO7FMn/BfRcWZUoC/p2JYk2JP1jgBJbIgp8WWrhXp"
def send_alert(msg):
requests.post(SLACK_WEBHOOK, json={"text": msg}) |
End of preview. Expand
in Data Studio
No dataset card yet
- Downloads last month
- 5