WhisperX tag archive

#credentials

This page collects WhisperX intelligence signals tagged #credentials. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (18)

The Network · 2026-03-06 05:13:08 · ai

1. 🔒 RSOLV Security Scanner Exposes Hardcoded API Keys in Nodegoat Demo Repository

A security vulnerability report generated by the RSOLV scanner has identified HIGH severity hardcoded secrets within the RSOLV-dev/nodegoat-vulnerability-demo repository. The scan, conducted on March 4, 2026, found two instances of a hardcoded API key across two configuration files. The vulnerability is classified unde...

The Lab · 2026-03-26 05:27:04 · GitHub Issues

2. Aqua Security Trivy Action Compromised: Threat Actor Force-Pushes Malware to 76 Version Tags

A threat actor has executed a sophisticated supply chain attack against Aqua Security's critical open-source security tools. Using compromised credentials, the attacker published a malicious version of the Trivy vulnerability scanner (v0.69.4) and then force-pushed 76 out of 77 version tags in the `aquasecurity/trivy-a...

The Lab · 2026-03-29 02:26:48 · GitHub Issues

3. OpenBao Secrets Operator Exposed: GO-2024-2947 Vulnerability Leaks HTTP Basic Auth Credentials to Logs

A critical security vulnerability has been confirmed in the OpenBao Secrets Operator, where sensitive HTTP basic authentication credentials can be written in plain text to log files. The flaw, tracked as GO-2024-2947, is classified as 'reachable' by automated analysis tools, meaning the vulnerable code path is active a...

The Lab · 2026-03-29 03:26:56 · GitHub Issues

4. SECURITY: ICE/TURN Server Credentials Exposed via Unauthenticated API Endpoint

A critical security vulnerability allows any unauthenticated client to retrieve the credentials for a TURN server directly from a public API endpoint. The `/api/voice/ice` endpoint returns the username and password for the TURN (Traversal Using Relays around NAT) server without requiring any form of authentication. Thi...

The Lab · 2026-03-30 02:26:56 · GitHub Issues

5. OpenBao Secrets Operator Exposed: GO-2024-2947 Vulnerability Leaks HTTP Basic Auth Credentials to Logs

A critical security vulnerability has been confirmed in the OpenBao Secrets Operator, where sensitive HTTP basic authentication credentials can be written in plain text to log files. The flaw, tracked as GO-2024-2947, is classified as 'reachable' by automated scanning tools, meaning the vulnerable code path is actively...

The Lab · 2026-03-30 12:27:09 · GitHub Issues

6. [SECURITY] Critical Data Exposure: JSON.stringify in Error Builder Leaks Passwords, API Keys, PII

A critical security vulnerability in a core error-handling function is exposing sensitive data—including passwords, API keys, and personal information—directly into application logs and error messages. The flaw resides in the `error()` function within `packages/core/src/error/builder.ts`, where the default behavior use...

The Lab · 2026-03-31 09:27:11 · GitHub Issues

7. Aqua Security Trivy Action Compromised: Threat Actor Force-Pushed Malware to 76 Version Tags

A critical supply chain attack has compromised the official GitHub Actions for Aqua Security's Trivy vulnerability scanner. On March 19, 2026, a threat actor used stolen credentials to publish a malicious Trivy v0.69.4 release and then force-pushed 76 out of 77 version tags in the `aquasecurity/trivy-action` repository...

The Lab · 2026-03-31 12:27:39 · GitHub Issues

8. OpenBao Secrets Operator Exposed: GO-2024-2947 Vulnerability Leaks Sensitive Auth Credentials to Logs

A confirmed, reachable vulnerability in the OpenBao Secrets Operator's main branch is actively leaking sensitive HTTP basic authentication credentials to log files. The security flaw, tracked as GO-2024-2947, stems from a failure to sanitize URLs before they are written to logs within a critical dependency. This create...

The Lab · 2026-03-31 16:27:20 · GitHub Issues

9. Trivy Action Compromise: Threat Actor Force-Pushes Malware to 76 Version Tags

A sophisticated supply chain attack has compromised the widely used `aquasecurity/trivy-action` GitHub Action, with a threat actor using stolen credentials to force-push malware to 76 out of 77 version tags. The attack, detailed in a GitHub security advisory, began on March 19, 2026, when the actor published a maliciou...

The Lab · 2026-03-31 18:27:16 · GitHub Issues

10. Aqua Security Trivy Action Compromised: Malicious Tags Force-Pushed in Major Supply Chain Attack

A sophisticated supply chain attack has compromised the official GitHub Actions for Aqua Security's Trivy, a critical open-source security scanner used by millions of repositories. Threat actors used stolen credentials to publish a malicious Trivy v0.69.4 release and then force-pushed 76 out of 77 version tags in the `...

The Lab · 2026-04-02 05:26:58 · GitHub Issues

11. Aqua Security Trivy Supply Chain Attack: Malicious Releases & Credential-Stealing Tags Deployed

A sophisticated supply chain attack has compromised the core security tools of Aqua Security's Trivy project. Threat actors, using compromised credentials, successfully published malicious software releases and overwrote dozens of version tags with credential-stealing malware, directly targeting the software supply cha...

The Lab · 2026-04-04 23:26:53 · GitHub Issues

12. SonarCloud Flags 'Password' Variables as Major Vulnerability in Codebase — 12 Instances Under Review

SonarCloud has triggered a major vulnerability alert across the codebase, identifying 12 instances where variables or parameters named 'password' could represent hardcoded credentials. The S2068 rule, which governs this detection, is designed to catch potential secrets embedded directly in source code—a critical securi...

The Lab · 2026-04-11 13:22:37 · GitHub Issues

13. Security Flaw: Database Migration Scripts Log Plaintext Passwords in Production Code

A critical security vulnerability has been identified in a production codebase, where database migration scripts are logging plaintext passwords directly to console output. The flaw, classified as a P0 high-severity issue, involves two specific functions within the `server/src/db/migrations.ts` file. On line 288, the `...

The Lab · 2026-04-15 23:22:59 · GitHub Issues

14. Critical Security Flaw: Hardcoded Credentials Exposed in main.py Source Code

A critical security vulnerability has been exposed within a main.py file, where sensitive credentials like API keys or passwords are embedded directly into the source code. This practice, known as hardcoding, leaves the entire application and its connected systems open to immediate compromise if the code repository is ...

The Lab · 2026-04-17 21:22:55 · GitHub Issues

15. Critical Security Flaw: Hardcoded Credentials Exposed in main.py Source Code

A critical security vulnerability has been discovered within the main.py file, where sensitive credentials are hardcoded directly into the source code. This practice embeds usernames and passwords in plain text, creating a severe exposure point. If the repository is compromised, these credentials can be easily extracte...

The Lab · 2026-04-17 21:22:58 · GitHub Issues

16. Critical Security Flaw: Hardcoded Database Credentials Exposed in main.py

A critical security vulnerability has been discovered within a codebase, exposing hardcoded database credentials directly in the main.py file. This practice creates a severe and immediate risk, as any leak or compromise of the source code would grant attackers direct, unauthorized access to the database and its sensiti...

The Lab · 2026-04-18 05:22:31 · GitHub Issues

17. Go-Git Security Flaw Exposes HTTP Credentials in Redirects, Prompts Urgent Dependency Updates

A critical vulnerability in the widely used `go-git` library risks leaking HTTP authentication credentials during standard Git operations. The flaw, tracked as GHSA-3xc5-wrhm-f963, is triggered when a remote repository responds to a clone or fetch request with a redirect to a different host. In this scenario, the libra...

The Lab · 2026-04-21 14:23:02 · GitHub Issues

18. Clawith v1.8.1 Agent Exposes PostgreSQL Passwords and Sensitive Environment Variables

A critical security vulnerability in Clawith v1.8.1 allows its AI Agent to directly expose sensitive environment variables, including database passwords, to users. This flaw effectively turns the Agent into a conduit for credential exfiltration, where simple conversational prompts can force it to reveal secrets like th...