Skip to content

audit: Secrets, credentials, and configuration security #46

@Snider

Description

@Snider

Security Audit: Secrets & Configuration

Hunt for exposed secrets and insecure configuration.

Secret Detection

Scan for:

  1. API Keys - AWS, GCP, Azure, Stripe, etc.
  2. Passwords - Hardcoded in code/config
  3. Tokens - JWT secrets, OAuth tokens
  4. Private Keys - SSH, SSL/TLS, signing keys
  5. Database Credentials - Connection strings

Check Locations

  • Source code (all files)
  • Configuration files
  • Environment files (.env, .env.example)
  • Docker files
  • CI/CD configs
  • Git history

Configuration Security

  1. Default Credentials - Changed from defaults?
  2. Debug Mode - Disabled in production?
  3. Error Verbosity - Leaking stack traces?
  4. CORS Policy - Too permissive?
  5. Security Headers - CSP, HSTS, etc.?

Output

Save to AUDIT-SECRETS.md

Do not include actual secret values - just location and type.

Metadata

Metadata

Assignees

No one assigned

    Labels

    julesFor Jules AI to work on

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions