When you accidentally share your secrets with the Internet
Uh-oh - I've just shared my secrets with the Internet.
It's an easy mistake, but you'll only make it once: accidentally uploading your secrets to Github. What do you do now?
Why does th...
Published May 08, 2019
Version 1.0MichaelOLeary
Employee
Joined May 15, 2019
MichaelOLeary
Employee
Joined May 15, 2019
hooleylist
Feb 06, 2020Cirrostratus
Here are some related links from AWS and Github on this:
https://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.html
https://aws.amazon.com/blogs/security/what-to-do-if-you-inadvertently-expose-an-aws-access-key/
https://help.github.com/en/github/authenticating-to-github/removing-sensitive-data-from-a-repository
If you commit sensitive data, such as a password or SSH key into a Git repository, you can remove it from the history. To entirely remove unwanted files from a repository's history you can use either the git filter-branch command or the BFG Repo-Cleaner open source tool.