-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
Hello,
My name is Emma, I am conducting an academic study on possible credential exposure in public GitHub repositories.
While analyzing this repository, I found a string that may represent a credential. I'm including the code snippet below containing possible leakage. To avoid exposing sensitive information publicly, I marked the sensitive information.
Could you please help clarify whether the detected string is:
- a real credential, or
- a placeholder / example value?
Thank you for your time.
Code snippet (sensitive values masked):
## gitlab-shell
################################################################################
# gitlab_shell['audit_us****mes'] = false
# gitlab_shell['log_level'] = 'INFO'
# gitlab_shell['log_format'] = 'json'
# gitlab_shell['http_settings'] = { user: 'us****me', pa****rd: 'pa****rd', ca_file: '/etc/ssl/cert.pem', ca_path: '/etc/pki/tls/certs', self_signed_cert: false}
# gitlab_shell['log_directory'] = "/var/log/gitlab/gitlab-shell/"
# gitlab_shell['custom_hooks_dir'] = "/opt/gitlab/embedded/service/gitlab-shell/hooks"
# gitlab_shell['auth_file'] = "/var/opt/gitlab/.ssh/authorized_keys"
### Migration to Go feature flags
Thank you in advance for your time - I really appreciate it!
Sincerely,
Emma
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels