Especially on Fridays, watch out what you're pushing and keep your code safe with @GitGuardian !
@GitGuardian is like the app that warns you that YOU LEFT A BABY IN YOUR CAR!!!!!!!!!!
@GitGuardian is like your secret friend that will warn you before you get into trouble.
@GitGuardian hey folks, I owe you another beer. Today I've committed another DO API key to the public repository 🙈 Thanks for your service ♥️
To enter the selection, drop us a line on Twitter! If your tweet gets picked, we’ll send you GitGuardian goodies 😎Drop us a line
Help them raise awareness and make the web a more enjoyable and secure place to be.Drop us a line
I'm also a big fan of @GitGuardian and @snyksec watching our back all day long. https://t.co/SieH4JswR7
Marcos Ortiz 💉 💉
I would love to see the @expa team working with @GitGuardian. I truly think that these guys are amazing. @crrob @gc you should meet with this amazing crew: @advocatemack @jeditch @AfkZiad This report says all https://t.co/3b5vHLoiSa
@jachands @jycouet @GrantGlidewell @JacobMGEvans Good practice! To avoid further issues in the future, I can recommend @GitGuardian.
@eddiejaoude Completely agree and having a CI pipeline or tools like @GitGuardian is a must for all the repos.
This was me moments ago but with google service account credentials and secrets. My mail was on fire from @googlecloud and @GitGuardian https://t.co/wdkCtWDp27
Aditya Oberai (he/him)
@KushalVijay_ I've got @GitGuardian set up for this very purpose. Let's me know immediately if I end up pushing an credentials to GitHub. Pretty nifty tool, I will say 💯
Just got an email from @GitGuardian about a repo I accidentally included an RCON password in. Amazing product, scanned my repo and emailed me before I even realized what I did.
@KushalVijay_ Usually, When any sensitive API key is being pushed to Github I always gets the real-time notification and thanks to GitGuardian, I never faced such issues https://t.co/bjJ2wJX5dg
@apopoutsis @GitGuardian is great for finding stuff like this! I had .env all set up, then accidentally committed a build folder and the secret got pushed. GitGuardian gave me a heads up about it super quickly!
Thanks to a flag from @GitGuardian I was able to find a major data vulnerability in the #Olympics2022 App. The https://t.co/2mWLn8QdKt in the iOS decompiled app, contains hardcoded values. APP_ID APP_KEY BUNDLE_IDENTIFIER with a properly formed json curl request data is auth https://t.co/O1dZ7OM8Vq
@HaseebAnwar_ That’s good. I’m sure GitGuardian has saved quite a few people after doing this. 😄 Mine were for school projects so it wasn’t very serious.
@MarisaBrantley I accidentally exposed keys many times but GitGuardian never took more than 10 seconds to notify.
@GitGuardian is really nice tool. They warned me before I had an account there and it saved my ass. So thanks a lot! <3
Bill Kavadias 🍩
If anyone wants to check their repo for exposed secrets @GitGuardian is amazing Pros: Super easy setup and a fair pricing module for business 💯 Cons: I either need to fix this or take down my personal repo 😅
@SMT_Solvers @vxunderground @RecordedFuture @symflower ohhhhh good thought!!! i'm going to make an account right now. I ran it through @GitGuardian and the results are pretty amazing
backing up a project in @github and received an email stating "GitGuardian has detected the following Bearer Token exposed within your GitHub account." Thank you GitGuardian! provided useful links on resolving <https://t.co/Kyzb3SC0At> <https://t.co/eNmzgtWSSj>
I accidentally pushed a valid Slack Webhook URL into a github repository. In 5 minutes I got email from Slack and GitGuardian to warn me about the incident. That's great! 👏
@GitGuardian Better safe than sorry! Amazing! Lower the risk. It is essential to invest in #cybersecurity