CISA Admin Leaked AWS GovCloud Keys on GitHub

LLMs and Secret Leakage

  • Many commenters warn that local .env files, shell rc files, and logs are being read by LLM-based coding tools and sent to vendors, potentially ending up in training data and logs.
  • Some report LLMs explicitly admitting they read .env and stored secrets in transcripts; others note newer guardrails that try to avoid or mask secrets, but see them as unreliable “guard jello.”
  • Debate on whether vendors sanitize/paraphrase secrets before training: some assume they must, others see no evidence and think it’s extra work with little incentive.
  • Threat model: LLMs memorizing credentials which might later be extractable via clever prompting; others note no concrete evidence of such leaks yet.

Secret Management Practices & Tools

  • Strong push to eliminate plaintext secrets: use SOPS, Vault, cloud secret managers, varlock, etc.; keep secrets short-lived, scoped, and non-production where possible.
  • Some advocate encrypted envs combined with tools like direnv; others note that if an agent can run arbitrary code, it can still fetch machine credentials from metadata services.
  • Several stress cleaning up personal dev machines and treating LLM agents like potential intruders with wide file access; mention OS-level sandboxing tools to constrain agents.

API Keys vs Identities / OAuth

  • Multiple comments argue for “death of the API key” in favor of workload identity, IAM roles, OIDC/OAuth with short-lived tokens, and capability-scoped credentials.
  • Counterpoints: refresh tokens and JWTs can be leaked just like API keys and sometimes merely “shuffle” the problem; misuse and poor hygiene remain core risks.
  • Some predict API keys will persist because they’re simpler and startups will keep reintroducing them.

The CISA Leak and Organizational Failures

  • Storing AWS GovCloud keys and plaintext password CSVs is widely labeled gross negligence, especially for a cybersecurity agency.
  • Some see it as simple incompetence and lack of training; others highlight systemic failures: disabling GitHub’s secret scanning, using spreadsheets for passwords, and not responding to disclosure.
  • A minority speculate about possible sabotage or foreign influence, but others argue available evidence only supports negligence.

Politics, Gutting, and Capacity

  • Repeated theme: budget cuts and purges of experienced staff at the agency and related departments have degraded security culture and oversight.
  • Disagreement: some blame political “gutting” for such incidents; others argue gutting doesn’t create incompetence but amplifies existing problems.