CISA accidentally leaked their own keys on GitHub
Posted by PM-ME-UR-DARKNESS@reddit | programming | View on Reddit | 17 comments
Posted by PM-ME-UR-DARKNESS@reddit | programming | View on Reddit | 17 comments
SoilMassive6850@reddit
Understatement and a half. People storing a bunch of passwords insecurely and leaking them is one thing, but this thing in my opinion implies at least:
System specific user accounts, rather than SSO based on user permissions (with authenticating proxies where necessary if theres no native software support). Realistically for internal use one person should only have a few user accounts total for the entire org (if you want to separate the regular office work account and management accounts for the people who need it)
Not using hardware based auth with things like FIDO2 or PIV, no reason for password use except in exceptional circumstances in 2026. Smart card SSO is old news by now.
Access tokens stored anywhere outside a secret vault which provisions them directly to services without human read access after creation (or highly monitored and audited access if write only is not possible) and automatic creation in cases of internal systems where everything can be generated and provisioned automatically. Of course if in this case the supposed important aws tokens are actually just strictly scoped dev tokens it might be understandable, but based on my reading of the article it wasn't.
External service accounts stored anywhere outside a monitored, audited and strictly scoped secret vault, with strict policies forbidding local long term storage (say for things like a vendor account management dashboards used for billing and such)
There's probably more.
In general the poor state of secrets management in organizations is quite sad. Even in supply chain attacks its always "developer got malware and had full permission API tokens on his dev machine to take over all his repositories and packages"
This reads to me as "startup starring a man, a .env file, docker and a dream" levels of security.
RationalDialog@reddit
Yeah. Large international company I work for uses one of the known big services providers to manage infrastructure. It's bad. I have a t least 3 times been in a meeting were one of these guys opens a text file on the desktop full of admin passwords while sharing the screen.
At the same time I can barley work "because of IT security".
PM-ME-UR-DARKNESS@reddit (OP)
I bet you its a fuckin vibe coder
MajesticalPookachu@reddit
DOGE really did their job here it looks.
my_password_is______@reddit
gee, if only you knew what you were taling about
MajesticalPookachu@reddit
(With a simple Google search)
The Department of Government Efficiency (DOGE) implemented significant workforce and budget reductions at the Cybersecurity and Infrastructure Security Agency (CISA). The restructuring included: [1]
logosobscura@reddit
Also turned off the policy that would have stopped this and it was in the wild for 6 months.
So bullshit there is no ‘evidence of usage’, from the honeypot tests I’ve seen, bots scrape and start using keys in seconds on GH.
Hard to take CISA seriously after this. Drink your own champagne.
1esproc@reddit
No it isn't, it's also SSO token got stolen and gave access to everything - you know, the thing you're supporting in your first point.
bzbub2@reddit
unclear if its true or just a news worthy bite but "Valadon said he reached out because the owner in this case wasn’t responding and the information exposed was highly sensitive." is sort of extra stupid on top
Fluent_Press2050@reddit
I want to believe this was intentional to honeypot so CISA can learn new attack vectors.
PM-ME-UR-DARKNESS@reddit (OP)
Cybersecurity is literally in their name 😭 💀 we are so fuckin cooked y'all
SiteRelEnby@reddit
Competence Is Seldom Available?
Spiritual_Load3525@reddit
This one looks pretty serious—seeing AWS GovCloud keys exposed in a public GitHub repo suggests a pretty significant gap in either design or operational controls.
Given it’s around CISA-related infrastructure, it feels less like a simple mistake and more like a failure in validation and security review processes.
Cases like this usually point to structural issues: missing or insufficient secrets management and lack of automated checks in CI/CD rather than just individual human error.
ScottContini@reddit
Hackers are laughing their heads off.
Shivaess@reddit
I’m not sure what you’re talking about!! We haven’t seen any high level problems in the government lately at. all.
fordat1@reddit
These are the people that want the keys to an unencrypted surveillance state
dlg@reddit
They’re leading by example.