Secrets

Secrets

By DeepSource

Secrets detected in source code SCT-1000
Secrets
Critical

Secrets should never be checked into source code. Ideally, they should be injected into the runtime and then the values should be picked from there.

Hardcoded FreshBooks access token in source code SCT-1069
Secrets
Critical

Leaking a FreshBooks access token in source code can cause severe security issues as it can give unauthorized access to FreshBooks resources, leading to a potential data breach and financial loss due to unauthorized utilization of FreshBooks resources.

If an access token has been leaked, it is recommended to regenerate it to mitigate the vulnerability.

Hardcoded Slack web hook in source code SCT-1007
Secrets
Critical

Leaking a Slack web hook URL in source code can cause a security risk as it can give unauthorized access to the Slack workspace and potentially leak sensitive information. If a Slack web hook has been leaked, you can create a new webhook and disable the exposed the exposed one to mitigate the vulnerability.

Hardcoded SendGrid API token in source code SCT-1032
Secrets
Critical

Using hardcoded SendGrid API tokens in source code can cause severe security issues as it can give unauthorized access to SendGrid resources, which can result in a data breach and financial loss. If an API token has been leaked, you can revoke your API token to mitigate the vulnerability.

Hardcoded JavaScript Web Token in source code SCT-1004
Secrets
Critical

Leaking a JavaScript Web Token (JWT) in the source code can pose a serious security risk, as it can give unauthorized access to resources and sensitive information in the web application. This can lead to data breaches and loss of confidential information.

If a JWT secret has been leaked, you can deprecate the old secret and use a new one to mitigate the vulnerability.

Hardcoded HashiCorp Terraform API token in source code SCT-1017
Secrets
Critical

Leaking a HashiCorp Terraform API token in source code can cause severe security issues as it can give unauthorized access to critical infrastructure resources. Unauthorized access to infrastructure resources can lead to system outages, data breaches, and financial loss.

If an API token has been leaked, you can revoke the token to mitigate the vulnerability.

Hardcoded Telegram Bot API token in source code SCT-1049
Secrets
Critical

Leaking a Telegram Bot API token in source code can cause severe security issues as it can give access to the bot and its resources, leading to potential data breaches and unauthorized usage. It is crucial to ensure that API tokens are not hardcoded in the source code to mitigate these risks.

If a token has been leaked, it is recommended to revoke access to the bot to prevent any further unauthorized access.

Hardcoded TravisCI API key in source code SCT-1050
Secrets
Critical

Leaking a TravisCI API key in source code can lead to severe security breaches as it can provide access to TravisCI resources. This can result in unauthorized utilization of TravisCI resources, potentially leading to data breaches and financial loss.

Hardcoded private key in source code SCT-1001
Secrets
Critical

Leaking private keys in the source code can have serious implications regarding the security of the application. An attacker can gain access to the sensitive data and use it to perform malicious activities. Private keys are meant to be kept secret and are used for encryption, decryption, and authentication purposes.

Hardcoded GitHub token in source code SCT-1008
Secrets
Critical

GitHub allows generating many types of tokens, like app tokens, OAuth tokens, Personal Access Tokens (PATs), fine-grained PATs, and refresh tokens. Leaking a GitHub token in source code can cause severe security issues as it can give unauthorized access to GitHub resources, which can result in a data breach and financial loss due to unauthorized utilization of GitHub resources.