pypi-data / pypi-aws-secrets

This repo scans pypi for AWS keys

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Note This repository has been superceded by the repositories within the https://github.com/pypi-data/ Github organisation. See https://py-code.org/ for more information.

What is this?

This is a project to try to detect any AWS access keys that are accidentally uploaded to the Python Package Index (PyPi).

New uploads are scanned periodically, and if a valid key is detected then it is added to this repository under the keys directory. This will then notify AWS (via Github secret scanning) which will cause AWS to secure your key.

What's wrong with adding IAM credentials into code?

It can lead to anyone using these to perform potentially malicious actions on your account. See the AWS best practices document for more details.

How does it work?

This is a proof-of-concept that uses github actions to run a rust tool every hour. The main.rs file has a pretty good overview of the process and how it all works.

What happens when my key is added?

AWS will notify you via an email and apply the QuarantineV2 IAM policy onto the leaked key.

About

This repo scans pypi for AWS keys

License:MIT License


Languages

Language:Rust 98.5%Language:Shell 1.5%