Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the critical issue of accidental credential leakage in public repositories in this 27-minute conference talk. Delve into the evolution of version control software and the ease of creating open-source projects, which has inadvertently led to increased instances of sensitive data exposure. Learn about the tools that scan repositories for vulnerable information and the rapid exploitation that follows. Discover the development and implementation of a "token nuker," an automated system designed to detect and disable exposed Slack tokens before they can be misused. Gain insights into strategies for preventing developers from inadvertently compromising security and methods to mitigate potential damage when breaches occur.