Statistics from Secret Scanning #129787
Unanswered
Codaea
asked this question in
Code Security
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Select Topic Area
Question
Body
heyo! (TLDR @ Bottom)
got a kind of interesting question. I was scrolling through the secret scanning pattern documentation and saw some big names missing, and saw some interesting stuff. some big names are missing features like cloudflare, and more.
Most people push their secrets to origin on accident, and these sorts of features save lots of time and money. But for the world, take the average programmer, and assume half of them are dumber than them. (mostly myself)
I was wondering if analytics were kept for what secrets/tokens get leaked the most, and what services are the most likely to get leaked. My bet is discord bot tokens, due to the amount of new programmers coming from that direction.
so in order, my G.S.L.A. (GitHub Secret Leaking Analysis) Bracket is the following.
Rules to playing?
1. NO CHEATING - no using google, finding user counts for a platform, etc
NO MICROSOFT EMPLOYEES - if we get results, you could have insider information. proof is required to participate that you haven't seen the actual answers
MANDATORY FUN - no mean things below, and if you aren't having fun you are Cheating
TOP 3
and for a few individual battles
Canva VS Alibaba
CANVA - i think its close, but i think canva gets more developers
Postman vs Mailgun
MAILGUN - I think mailgun gets more users
TLDR;
what keys get leaked the most on github? is this info even tracked?
Beta Was this translation helpful? Give feedback.
All reactions