Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider removing AWS_ACCESS_KEY_ID from mirror workflow #1992

Closed
udondan opened this issue Jul 5, 2022 · 2 comments
Closed

Consider removing AWS_ACCESS_KEY_ID from mirror workflow #1992

udondan opened this issue Jul 5, 2022 · 2 comments
Labels

Comments

@udondan
Copy link

udondan commented Jul 5, 2022

In the file /master/.github/workflows/mirror.yml#L25 you expose your AWS_ACCESS_KEY_ID.

Apart from the fact that this might be a security concern, this is causing problems on user end when scanning with security tools. For example the popular vulnerability scanner Trivy is raising a critical error.

CleanShot 2022-07-05 at 09 04 00

Would be great if you could move the value to a github secret, just like the AWS_SECRET_ACCESS_KEY.

@udondan udondan added the bug label Jul 5, 2022
@mislav
Copy link
Member

mislav commented Jul 6, 2022

Thanks for raising this issue. I won't, however, move this to a secret just because a vulnerability tool considers this a critical error:

  • The key is already in git. Moving it to a "secret" does not obfuscate it in any way since it doesn't remove it from git history;
  • Knowing someone's access key ID can cause no damage, and is in fact no vulnerability in it of itself.

You could try configuring your scanner so it doesn't consider this a critical error.

@mislav
Copy link
Member

mislav commented Mar 10, 2023

Update: the AWS access key is now gone from version control

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants