53 lines
1.4 KiB
Plaintext
53 lines
1.4 KiB
Plaintext
![]() |
|
||
|
include::../../../shared_content/secrets/description.adoc[]
|
||
|
|
||
|
== Why is this an issue?
|
||
|
|
||
|
include::../../../shared_content/secrets/rationale.adoc[]
|
||
|
|
||
|
=== What is the potential impact?
|
||
|
|
||
|
// Optional: Give a general description of the secret and what it's used for.
|
||
|
|
||
|
Below are some real-world scenarios that illustrate some impacts of an attacker
|
||
|
exploiting the secret.
|
||
|
|
||
|
// Set value that can be used to refer to the type of secret in, for example:
|
||
|
// "An attacker can use this {secret_type} to ..."
|
||
|
:secret_type: API token
|
||
|
|
||
|
// Where possible, use predefined content for common impacts. This content can
|
||
|
// be found in the folder "shared_content/secrets/impact".
|
||
|
// When using predefined content, search for any required variables to be set and include them in this file.
|
||
|
// Not adding them will not trigger warnings.
|
||
|
|
||
|
include::../../../shared_content/secrets/impact/personal_data_compromise.adoc[]
|
||
|
|
||
|
include::../../../shared_content/secrets/impact/financial_loss.adoc[]
|
||
|
|
||
|
== How to fix it
|
||
|
|
||
|
include::../../../shared_content/secrets/fix/revoke.adoc[]
|
||
|
|
||
|
include::../../../shared_content/secrets/fix/vault.adoc[]
|
||
|
|
||
|
=== Code examples
|
||
|
|
||
|
:example_secret: 51e35a011a698133ad155360a7d6447b
|
||
|
:example_name: kairos-app-key
|
||
|
:example_env: KAIROS_APP_KEY
|
||
|
|
||
|
include::../../../shared_content/secrets/examples.adoc[]
|
||
|
|
||
|
//=== How does this work?
|
||
|
|
||
|
//=== Pitfalls
|
||
|
|
||
|
//=== Going the extra mile
|
||
|
|
||
|
== Resources
|
||
|
|
||
|
include::../../../shared_content/secrets/resources/standards.adoc[]
|
||
|
|
||
|
//=== Benchmarks
|