Skip to content
This repository has been archived by the owner on Mar 3, 2024. It is now read-only.
/ pypi-aws-secrets Public archive

This repo scans pypi for AWS keys

License

Notifications You must be signed in to change notification settings

pypi-data/pypi-aws-secrets

Repository files navigation

Note This repository has been superceded by the repositories within the https://github.com/pypi-data/ Github organisation. See https://py-code.org/ for more information.

What is this?

This is a project to try to detect any AWS access keys that are accidentally uploaded to the Python Package Index (PyPi).

New uploads are scanned periodically, and if a valid key is detected then it is added to this repository under the keys directory. This will then notify AWS (via Github secret scanning) which will cause AWS to secure your key.

What's wrong with adding IAM credentials into code?

It can lead to anyone using these to perform potentially malicious actions on your account. See the AWS best practices document for more details.

How does it work?

This is a proof-of-concept that uses github actions to run a rust tool every hour. The main.rs file has a pretty good overview of the process and how it all works.

What happens when my key is added?

AWS will notify you via an email and apply the QuarantineV2 IAM policy onto the leaked key.

About

This repo scans pypi for AWS keys

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published