Settings

Theme

GitLab scan finds 17,000 secrets in public repos, leading to $9000+ in bounties

trufflesecurity.com

30 points by adrianwaj 18 days ago · 12 comments

Reader

jsiepkes 18 days ago

> Each Lambda invocation executed a simple TruffleHog scan command with concurrency set to 1000. This setup allowed me to complete the scan of 5,600,000 repositories in just over 24 hours.

Gitlab must have been thrilled about a bot cloning 5.6 million repo's in 24 hours. That doesn't really sound responsible to me.

  • treyd 18 days ago

    That's 64 clones per second. That's quite a lot but it seems like something that a forge operating at the scale of GitHub can handle, especially if they were --depth=1 (which might have missed some secrets if someone was lazy about clearing their git history).

    • digi59404 18 days ago

      Provided someone told GitLab Support. This was likely fine. GitLab can handle this much load. The platform as a whole has increased and improved over the years as new customers are added.

      Think about this… every CI/CD Job runs a clone. That’s a lot..

    • nojs 18 days ago

      Gitlab*

  • 47282847 18 days ago

    If they don’t like, they will apply rate limiting? Assuming they were well behaved (user agent, IPs).

    • pcdevils 18 days ago

      Assuming bog standard lambda they'd have to rate limit a whole Aws region lambda range which would risk affecting legit usage. Bit of an arse way to behave against a service

  • 3eb7988a1663 18 days ago

    I also thought the sleep(0.03) was cute. Some well deserved rest for the server to avoid hammering it.

greatgib 18 days ago

"Google Cloud Platform (GCP) credentials were the most leaked secret type on GitLab repositories"

Not surprising, Google SDK are sucking so much in term of authentication. It's never something simple like an API key, always a shitty iam like opaque function based on an opaque sdk needing to be installed that in the end requires a huge json. And most of the time, it is a pain in the ass to provide the token "as-is" in a buffer but the sdk expects that you give a file path to it. So, I easily guess that a lot of lazy devs will just store the credential json file in their project and consider it a job done.

vatsachak 18 days ago

9000 in bounties for 17,000 secrets?

You could make as much in a month creating those vulnerabilities

3eb7988a1663 18 days ago

The post keeps saying "verified secrets" - how are they verified? Did the author attempt to login to each service? Or does verified just means that it looks like a valid token?

iwontberude 18 days ago

Truffle Security treasury dollars: There are dozens of us! Dozens!

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection