jducoeur: (Default)
[personal profile] jducoeur
This article on Ars last week is worth a quick think for any engineer who is using GitHub. The thing it doesn't mention is that it is really *easy* to accidentally check in confidential information: all it takes is not paying attention to which files you are committing, and poof, you're screwed.

The moral of the story is, make sure that your .gitignore is set up to *never* check in full configuration files. Querki deliberately checks in a configuration *template* file, and ignores application.conf, specifically to make it hard to make this mistake. I recommend this practice or similar to any project that matters...

(no subject)

Date: 2015-03-10 10:31 am (UTC)
From: [identity profile] hudebnik.livejournal.com
I heard a similar story at a CS education conference last week. The school in question was teaching a course in Big Data, using Amazon cloud services for which they handed out authorization keys. Each student was expected to spend something like $100/week in cloud services, but this limit wasn't enforced at the Amazon level. One day the instructors noticed that a particular student had apparently spent $3000 in a week. Upon investigation, it turned out that the student had checked his code into GitHub, complete with Amazon authentication keys; somebody still unknown had grabbed it and started using the keys to mine Bitcoins.

Profile

jducoeur: (Default)
jducoeur

June 2025

S M T W T F S
12 34567
891011121314
15161718192021
22232425262728
2930     

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags