Skip to content

Leaked ClientID linkedin in sourcecode. #16

@philipjonsen

Description

@philipjonsen

DESCRIPTION
Secrets should never be checked into source code. Ideally, they should be injected into the runtime and then the values should be picked from there.

Examples of secrets are SSH keys, API keys and secrets (AWS or Stripe APIs, for example), database credentials etc.

BAD PRACTICE
In the sample Python code below, the secrets have been hardcoded:

key = "12345azan+/ryGUuk"
RECOMMENDED
Ideally, this should be picked from the environment, like:

key = os.getenv("SECRET_KEY")

Leaked "LinkedIn Client ID" detected in source: "IoLogoLinkedin"
src/config/icon.config.js

export const SocialFacebookIcon = IoLogoFacebook; // Social Facebook icon
export const SocialTwitterIcon = IoLogoTwitter; // Social Twitter icon
export const SocialGooglePlusIcon = IoLogoGoogleplus; // Social Google Plus icon
export const SocialLinkedinIcon = IoLogoLinkedin; // Social Linkedin icon
export const SocialDribbbleIcon = IoLogoDribbble; // Social Dribbble icon

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions