"Hello from github,
We detected that you uploaded credentials to NAME_OF_REPO. We strongly advise against this as it allows attackers to easily gain unauthorized access to your software and infrastructure.
Have a look at this blog where we discuss alternatives"
EDIT: Just to be clear, I'm not suggesting a ban at all, just a friendly email in response to commits that introduce credentials to public repos
Just to be clear, I'm not suggesting a ban at all, just a friendly email in response to commits that introduce credentials to public repos
I'd be all for an optional, branch protection-like feature though.
`--preserve-root'
Fail upon any attempt to remove the root directory, `/', when used
with the `--recursive' option. This is the default behavior.www.dulceswilly.com/mysql/BHP_sym/root/usr/local/etc/apache22/server.key
If I was on a non-company IP, I'd be tempted to poke around and see what else is visible...
Front page reads:
PELITABANGSA .CA [ INDONESIA CYBER ATTACK AND MALWARE ANALYST ]
Quite often you can go to domain.tld/.git/ and find the files if you know their names. Even major sites - The Hill only fixed it in the past few days.
# block .files
location ~ /\. {
deny all;
}
# allow Lets encrypt
location ~ /.well-known {
root YOUR LE DIRECTORY
allow all;
}https://opensource.apple.com/source/tcl/tcl-87/tcl_ext/tclli...
but of course you are welcome to share your run of the mill anecdotes about some intern once accidentally publishing passwords - etc. :)
I assume there’s some IP based quota, but I haven’t seen a knob for that on GCP at least.
Of course you can remove it. Just means more results to wade through.
Another interesting thing about google is that this search may return results that are not found without the inurl:server
Is that the JPL I thought it was?
The IP block is managed by INetU Inc, which was apparently a cloud hosting company now owned by Canadian telecommunications company Shaw Communications.
https://whois.arin.net/rest/poc/II25-ARIN
https://www.crunchbase.com/organization/inetu-managed-hostin...
The better question are those actual non-github sites that have them exposed (though others here have noted that those sites may already be hacked).
https://github.com/libguestfs/libguestfs/blob/master/p2v/Mak...
For instance, there have been times I've searched for something, and it gives back a lot of results, plus it has a pager with seemingly over 50 pages in it.
But - if I say "jump to the last page", suddenly the pager only shows four pages and I'm at the end of page 4...
What the heck is up with that? Sometimes, some really great information is buried under all the SEO'd to hell-and-back crap at the top. That's the info I want, and I don't care if the website owner cares about SEO or whatnot - because they are likely a small-time user (or they just have a very old page or something that hasn't been updated in 20 years)...