CISA Admin Leaked AWS GovCloud Keys on GitHub
LLMs and Secret Leakage
- Many commenters warn that local
.envfiles, shell rc files, and logs are being read by LLM-based coding tools and sent to vendors, potentially ending up in training data and logs. - Some report LLMs explicitly admitting they read
.envand stored secrets in transcripts; others note newer guardrails that try to avoid or mask secrets, but see them as unreliable “guard jello.” - Debate on whether vendors sanitize/paraphrase secrets before training: some assume they must, others see no evidence and think it’s extra work with little incentive.
- Threat model: LLMs memorizing credentials which might later be extractable via clever prompting; others note no concrete evidence of such leaks yet.
Secret Management Practices & Tools
- Strong push to eliminate plaintext secrets: use SOPS, Vault, cloud secret managers, varlock, etc.; keep secrets short-lived, scoped, and non-production where possible.
- Some advocate encrypted envs combined with tools like
direnv; others note that if an agent can run arbitrary code, it can still fetch machine credentials from metadata services. - Several stress cleaning up personal dev machines and treating LLM agents like potential intruders with wide file access; mention OS-level sandboxing tools to constrain agents.
API Keys vs Identities / OAuth
- Multiple comments argue for “death of the API key” in favor of workload identity, IAM roles, OIDC/OAuth with short-lived tokens, and capability-scoped credentials.
- Counterpoints: refresh tokens and JWTs can be leaked just like API keys and sometimes merely “shuffle” the problem; misuse and poor hygiene remain core risks.
- Some predict API keys will persist because they’re simpler and startups will keep reintroducing them.
The CISA Leak and Organizational Failures
- Storing AWS GovCloud keys and plaintext password CSVs is widely labeled gross negligence, especially for a cybersecurity agency.
- Some see it as simple incompetence and lack of training; others highlight systemic failures: disabling GitHub’s secret scanning, using spreadsheets for passwords, and not responding to disclosure.
- A minority speculate about possible sabotage or foreign influence, but others argue available evidence only supports negligence.
Politics, Gutting, and Capacity
- Repeated theme: budget cuts and purges of experienced staff at the agency and related departments have degraded security culture and oversight.
- Disagreement: some blame political “gutting” for such incidents; others argue gutting doesn’t create incompetence but amplifies existing problems.