Hacker News new | past | comments | ask | show | jobs | submit login

The types of secrets ought to be a bit different and less consequential on a developer's machine. If they're not, that's a pretty big red flag. It's one thing to gain access to clone some repositories (e.g. ~/.ssh) but an entirely different thing to get production aws credentials. Not to mention all the other protections that should be in place that mitigate the fallout (for example: no pushes to main/master/prod branches, requiring status checks and reviews before merges, etc).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: