-
Notifications
You must be signed in to change notification settings - Fork 29
Open
Description
Hello,
My name is Emma, I am conducting an academic study on possible credential exposure in public GitHub repositories.
While analyzing this repository, I found a string that may represent a credential. I'm including the code snippet below containing possible leakage. To avoid exposing sensitive information publicly, I marked the sensitive information.
Could you please help clarify whether the detected string is:
- a real credential, or
- a placeholder / example value?
Thank you for your time.
Code snippet (sensitive values masked):
/*
HookServe is a small golang utility for receiving github webhooks. It's easy to use, flexible, and provides strong security though GitHub's HMAC webhook verification scheme.
server := hookserve.NewServer()
server.Port = 8888
server.Secret = "super****etcode"
server.GoListenAndServe()
for {
select {
case event := <-server.Events:
fmt.Println(event.Owner + " " + event.Repo + " " + event.Branch + " " + event.Commit)
Thank you in advance for your time - I really appreciate it!
Sincerely,
Emma
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels