Supply chain, DevSecOps, Vulnerability Management
Secrets surge 67% to 10 million on GitHub as human error drives exposure

A new report by GitGuardian notes that 1 in 10 code authors exposed a secret on GitHub, while 5.5 commits out of 1,000 exposed at least one secret. ( Adobe Stock Images)
Secrets in GitHub reached 10 million occurrences last year, an increase of 67% from 2021. The historical high poses a significant threat to the software supply chain.The ever-increasing numbers were unveiled in GitGuardian's State of Secrets Sprawl 2023 report this week following the company’s extensive analysis of over 1 billion new commits on the open-souce software platform in 2022. What is noteworthy beyond that is that one out of 10 code authors exposed a secret, while 5.5 commits out of 1,000 exposed at least one secret. Secrets are not just credentials but serve as a cohesive force to various components of the modern software supply chain, wrote GitGuardian. Given their significance, they have been heavily targeted by hackers and drove major security incidents in 2022. For example, secrets were exploited in attacks against Uber as a hacker used hard-coded admin credentials to log into the company's Privileged Access Management platform, resulting in a full account takeover on several internal tools and productivity applications. Other incidents include stolen source code repositories affecting Microsoft, LastPass, Okta, Samsung, NVIDIA, Dropbox, Slack, and secrets leaked publicly impacting over 18,000 Android apps, Infosys, and TOYOTA. Monitor commits and merge/pull requests in real time for all repositories with native VCS or CI integration. Enable pre-receive checks to harden central repositories against leaks, and "stop the bleeding." Educate about using pre-commit scanning as a seatbelt. Plan for the longer term: develop your strategy for dealing with incidents discovered through historical analysis. Implement a secrets' security champion program. It is also worth highlighting that Docker images are one of the largest unmonitored attack surfaces, with GitGuardian finding more than 4,000 secrets being hard-coded in a 10,000 image sample. Yotam Perkal, director of vulnerability research at Rezilion, told SC Media that this might be because Docker image has a different build process, and organizations do not monitor it as closely as they do for the secrets in the codes that they push to GitHub. "These Docker files and the Docker build process should get the same amount of security attention as normal codes," Perkal said. SC Media previously reported that numerous critical vulnerabilities hidden in hundreds of Docker containers, downloaded billions of times collectively and remain undetected by most vulnerability scanners and SCA tools.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds