#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

32 C
Dubai
Wednesday, July 2, 2025
HomeTopics 2Data SecuritySecrets Sprawl Crisis Deepens: 23.7 Million New Credentials Exposed in 2024

Secrets Sprawl Crisis Deepens: 23.7 Million New Credentials Exposed in 2024

Date:

Related stories

Google Urgently Patches CVE‑2025‑6554 Zero‑Day in Chrome 138 Stable Update

On 26 June 2025, Google rapidly deployed a Stable Channel update...

French Police Arrest Five Key Operators Behind BreachForums Data-Theft Platform

On 25 June 2025, France’s specialist cybercrime unit (BL2C) detained five...

Cybercriminals Weaponized Open-Source Tools in Sustained Campaign Against Africa’s Financial Sector

Since mid-2023, a cybercriminal cluster dubbed CL‑CRI‑1014 has been...

Critical TeamViewer Remote Management Flaw Allows SYSTEM‑Level File Deletion

A high‑severity vulnerability, CVE‑2025‑36537, has been identified in TeamViewer...
spot_imgspot_imgspot_imgspot_img

The 2025 State of Secrets Sprawl report by GitGuardian reveals an alarming escalation in credential exposure, with 23.7 million new secrets detected in public GitHub repositories a 25% surge from 2023. Despite advancements in detection tools like GitHub’s Push Protection, 70% of valid secrets leaked in 2022 remain active today, leaving organizations vulnerable to breaches, supply chain attacks, and lateral movement by threat actors.

This year’s report, leveraging AI-enhanced detection, uncovers the growing menace of generic secrets (58% of all leaks), rampant exposure in private repositories (35%) and Docker Hub (100,000+ valid keys), and the unintended consequences of AI coding assistants like GitHub Copilot (40% higher leak incidence). Below, we dissect the critical findings and provide actionable strategies to combat secrets sprawl.

Key Findings from the 2025 Secrets Sprawl Report

1. Secrets Sprawl Hits Record Highs

  • 23.7 million new secrets exposed on GitHub in 2024, up from 19.1 million in 2023.
  • 4.6% of all public repositories contained at least one secret.
  • 35% of private repositories harbored hardcoded credentials, highlighting misplaced trust in “security through obscurity.”

2. The Rise of Generic Secrets

  • 58% of detected secrets were generic (e.g., passwords, database strings), up from 49% in 2023.
  • Unlike structured API keys, generic secrets evade pattern-based scanners like GitHub Push Protection.
  • Example: A Base64-encoded database credential (password="m42ploz2wd") found in a public commit.

3. GitHub Push Protection: Limited Impact

  • Effective for patterned keys (e.g., OpenAI’s sk~ prefix), reducing leaks by 50%+.
  • Fails for generic secrets: MySQL, MongoDB, and Google API keys saw no decline in exposures.
  • Bypass risks: Developers can override warnings or mark leaks as “test credentials.”

4. Private Repositories: 8x Riskier Than Public

  • 35% of private repos contained secrets vs. 4.6% of public repos.
  • Top leaks in private code:
  • ODBC connection strings (10%)
  • AWS IAM keys (8%)
  • Okta tokens (1.7%)

5. Docker Hub: 100,000+ Valid Secrets Exposed

  • Scanning 15 million public images revealed:
  • 101,186 valid secrets, including AWS, GitHub, and database credentials.
  • 65% of leaks traced to ENV instructions in Dockerfiles.
  • Case study: A deleted .npmrc file in a Docker layer still exposed a GitHub token (ghp_6e****).

6. AI Tools Amplify Leak Risks

  • Repositories using GitHub Copilot had a 40% higher leak rate (6.4% vs. 4.6% overall).
  • Root cause: Developers prioritize productivity over security when relying on AI-generated code.

7. Collaboration Tools: The Overlooked Threat

  • 38% of leaks in Slack/Jira/Confluence were “highly critical” vs. 31% in SCMs.
  • Jira tickets had the highest leak rate (6.1%), often due to troubleshooting logs.

8. Remediation Gap: 70% of Secrets Remain Active

  • 292 days: Average time to identify and fix credential breaches (per IBM).
  • Non-Human Identities (NHIs) exacerbate the problem:
  • 99% of GitLab tokens had excessive permissions (58% full access).
  • 96% of GitHub tokens granted write access.

10 Critical Strategies to Combat Secrets Sprawl

1. Adopt Secrets Management Tools

      • Use HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault—but ensure secrets aren’t hardcoded post-retrieval.

      2. Enforce Least-Privilege Access

        • Restrict NHI permissions (e.g., GitHub tokens with read-only access).

        3. Scan Beyond Git: Include Collaboration Tools

          • Monitor Slack, Jira, and Confluence for credentials using tools like GitGuardian.

          4. Implement Automated Secret Rotation

            • Rotate keys every 90 days and revoke exposed credentials immediately.

            5. Educate Developers on Secure Practices

              • Train teams to avoid:
                • Committing .env files.
                • Using AI tools without security reviews.

              6. Leverage GitHub Push Protection

                • Enable it for public and private repos, despite its limitations.

                7. Audit Docker Images Pre-Deployment

                  • Scan layers for secrets using ggshield or Snyk.

                  8. Monitor Public GitHub for Leaks

                    • Use GitGuardian’s public monitoring to detect company credentials exposed online.

                    9. Adopt “Secretless” Authentication

                      • Explore OAuth, SPIFFE, or certificate-based auth for NHIs.

                      10. Integrate Secrets Detection into CI/CD

                      • Block commits containing secrets via pre-commit hooks and pipeline scans.

                        Conclusion: A Call for Proactive Defense

                        The 2025 State of Secrets Sprawl report underscores a harsh reality: credentials are the weakest link in cybersecurity, fueling 31% of all breaches (Verizon DBIR 2024). With AI, low-code tools, and Docker adoption accelerating leaks, organizations must shift from detection to prevention—embedding secrets governance into DevOps workflows.

                        Key Takeaways:

                        • Generic secrets are the fastest-growing threat—traditional scanners miss them.
                        • Private repos are not safe havens—assume all code is public.
                        • Remediation lags dangerously—automate rotation and revocation.

                        For a deeper dive, download the full report from the source: GitGuardian State of Secrets Sprawl 2025.

                        Secure your secrets—before attackers find them. 🔒

                        Ouaissou DEMBELE
                        Ouaissou DEMBELEhttp://cybercory.com
                        Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

                        Subscribe

                        - Never miss a story with notifications

                        - Gain full access to our premium content

                        - Browse free from up to 5 devices at once

                        Latest stories

                        spot_imgspot_imgspot_imgspot_img

                        LEAVE A REPLY

                        Please enter your comment!
                        Please enter your name here