include::../../../shared_content/secrets/description.adoc[] == Why is this an issue? include::../../../shared_content/secrets/rationale.adoc[] === What is the potential impact? AMQP URLs containing credentials allow publishing and consuming messages from the queue. Below are some real-world scenarios that illustrate some impacts of an attacker exploiting the credentials. :secret_type: credentials include::../../../shared_content/secrets/impact/data_compromise.adoc[] include::../../../shared_content/secrets/impact/malware_distribution.adoc[] == How to fix it include::../../../shared_content/secrets/fix/revoke.adoc[] include::../../../shared_content/secrets/fix/vault.adoc[] === Code examples :example_secret: amqps://admin:password@example.com:8080/example :example_name: amqp-url :example_env: amqps://"+System.getenv("AMQP_CREDENTIALS")+"@example.com:8080/example include::../../../shared_content/secrets/examples.adoc[] //=== How does this work? //=== Pitfalls //=== Going the extra mile == Resources include::../../../shared_content/secrets/resources/standards.adoc[] //=== Benchmarks