Skip to content
#

secrets-management

Here are 165 public repositories matching this topic...

gitleaks
jessehouwing
jessehouwing commented Mar 16, 2021

Gitleaks is missing quite a few rules for the Microsoft ecosystem, including Visual Studio, Azure and Azure DevOps.

Microsoft used to have a competing product called credscan, but it was recently deprecated in favor of the GitHub Security offerings.

I've ported most of the rules from credscan to the gitleaks format and put them in a repo here:
https://github.com/jessehouwing/gitleaks-azur

guxlightyear
guxlightyear commented Nov 11, 2020

While reviewing our application logs, I have noticed a line that looked like this (redacted for obvious reasons).

{"level":50,"time":1605105915359,"pid":17,"hostname":"platform-kubernetes-external-secrets-578c5b47f4-gh4db","stack":"TypeError: Cannot use 'in' operator to search for 'DATABASE_PORT' in DATABASE_HOST=<redacted> DATABASE_PORT=3306 DATABASE_USER=<redacted> DATABASE_PASSWORD=<red
snip
zoltanarvai
zoltanarvai commented Jul 16, 2021

Currently when I create a new profile it's not set as default. During command executions I also do not see what the profile is. As a result if I leave the --profile flag from the command I get errors that are quite strange and misleading. It would be good to:

  • either set a default profile and see it on command executions
  • or have some warnings / potential fixes with errors like: Are you runnin

Improve this page

Add a description, image, and links to the secrets-management topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the secrets-management topic, visit your repo's landing page and select "manage topics."

Learn more