Feb. 28, 2023, noon | tor@legitsecurity.com (Tor Beer)

Legit Security Blog www.legitsecurity.com




Development secrets are any data sensitive to an organization or person and should not be exposed publicly. It can be a password, an access key, an API token, a credit card number, and more. You can read more about the dangers of secrets getting exposed via your source code management (SCM) systems here. But hard-coded secrets in the code are not the only services from which secrets can get leaked. Essentially, any service you’re using as part of your …

access api card case code code management credit credit card data development exposed exposing hard key leaked management organization password scm sdlc secrets services source code systems token tools

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Associate DevSecOps Engineer

@ LinQuest | Los Angeles, California, United States

DORA Compliance Program Manager

@ Resillion | Brussels, Belgium

Head of Workplace Risk and Compliance

@ Wise | London, United Kingdom