Thank you. It was very to know that we need to create new access keys when we configure. I could not figure where the secret access key was coming. Thank you so much
@priyankachekuri4213Ай бұрын
Do u use twistlock for prisma scan??
@cambsdigital2 ай бұрын
Handy and thank you. But you need a JDK which on my old mac was not easily possible. Crazy! Git should have something inbuilt to handle this better.
@CristhianPinto-i6z2 ай бұрын
If I need testing a private repository, GitGuardian can review this code? O not?
@GitGuardian2 ай бұрын
Yes It can.
@CynthiaNkosi-tp9hf3 ай бұрын
South Africa
@hemanthnaik34033 ай бұрын
Not sufly this coding
@helpertech23163 ай бұрын
Bro. Actually I have seen a lot. This video matches exactly my expectation.
@kiranbakale82074 ай бұрын
Much needed!!. Keep up the good work, you are doing great mack
@GitGuardian3 ай бұрын
Thank you! Will do!
@paulhetherington38544 ай бұрын
HACK -- Helped that goth - murder another - of them devils! You be, in the clan!
@paulhetherington38544 ай бұрын
How would u, ever know, any TOKYO CHRX -- data? DUM AS
@codak294 ай бұрын
Great video.
@GitGuardian3 ай бұрын
Thanks!
@KrishanChhimpa-l9m4 ай бұрын
what about multiple branches, do we need to do it for all the branches ?
@mohammediftekharsalam82554 ай бұрын
Bro I am seeing this video on a Tuesday coincidentally
@rohithgowdax4 ай бұрын
am really exited to use your app , loved it ❤
@คุณานนต์วงค์อ่วน-ถ4ฑ4 ай бұрын
fuk somsung fuk hscker fuk chaina fuk lock account im fro to fuk chaina fuk somsung fuk hacker fuk zero pro fuk somsung
@finix74195 ай бұрын
best .gitignore video I've seen so far with more advanced examples
@kamyarghanbarpour7645 ай бұрын
Thanks a lot
@GitGuardian5 ай бұрын
Most welcome
@shubhampatel54065 ай бұрын
It was great hear from jeroen Willemsen sir, I admire his works in wrongsecrets
@GitGuardian5 ай бұрын
Yeah, Jeroen Willemsen is awesome in "Wrongsecrets"! Thanks for checking out the video!
@jong.48646 ай бұрын
Thanks gitguardian!
@GitGuardian5 ай бұрын
Welcome!
@Kabodanki6 ай бұрын
Gitleaks would be one job in a push commit pipeline lol
@angellopez66876 ай бұрын
Very helpful!
@GitGuardian5 ай бұрын
Glad you think so!
@test-em3re6 ай бұрын
will this work on GitHub desktop ?
@dustingarner46206 ай бұрын
Very helpful, thank you!
@GitGuardian5 ай бұрын
Thank you for watching and finding it helpful!
@SMGAPR87 ай бұрын
Dirty rug too, thankyou great information 👍
@GitGuardian5 ай бұрын
Thanks for watching!
@SMGAPR87 ай бұрын
2024 update?
@SMGAPR87 ай бұрын
Other people could be an auto BOT, how would the dumb know? When you all they do is trawl seach or buy? First you have to educate the ignorant.
@RohitTiwari-mo8mi7 ай бұрын
Got an email few days back from GitGuardian detecting my github history for a committed RSA private key, Now I am watching this :D
@larsvagt13407 ай бұрын
Basically cool explanation. Unfortunately I cannot give to my dev team due to the joke. One of the devs is a dad who experience a similar thing at school and it would really hurt him. :(
@AlexanderHelwig-rq1uq7 ай бұрын
Thank you, this has helped me !
@GitGuardian5 ай бұрын
You're welcome!
@oooooOwOooooo7 ай бұрын
what if you want to publish the code in github?
@GitGuardian7 ай бұрын
Make sure you put the keys in a .Env file and then add that to the .gitignore file so the keys never make it to GitHub.
@anshuldishoriya29927 ай бұрын
nicely explained.
@GitGuardian5 ай бұрын
Thanks for liking
@AngilaSmith-mc6oc7 ай бұрын
Who do you contact if all your credentials have been hijacked
@คุณานนต์วงค์อ่วน-ถ4ฑ4 ай бұрын
fuk somsung fuk hscker fuk chaina fuk lock account im fro to fuk chaina fuk somsung fuk hacker fuk zero pro fuk somsung
@Kabodanki8 ай бұрын
I work in an IA company, I have to say... GPT is flawed, it is just a step for something else. Hallucination = We don't know what would be the answer, we can tweak, but ultimately we are never 99% sure of the answer, and for a lot of use cases this is absolutely inacceptable. Most of our clients have a hard time tuning their setup.
@GitGuardian8 ай бұрын
It is going to be very interesting to watch what comes next. Thanks for sharing your insights
@lxvi43228 ай бұрын
how can I use this inside Aws Services like ERM-Studio? tnx
@GitGuardian8 ай бұрын
You might want to try using AWS secrets manager for AWS native environments kzbin.info/www/bejne/l6SXmIqghr6lfsUsi=v8-fL7fkpw3lJQGE
@infossil8 ай бұрын
thank you, excellent
@rbw74568 ай бұрын
Nice going Microsoft. That's why I always use Linux
@TheExoryder8 ай бұрын
You should read about the latest linux backdoor then :)
@MultiBannanaSHITTTT7 ай бұрын
@@TheExoryderWhich only made it into rolling releases, for like 24 hours until it got caught and did any damage. No production systems affected. Also, that exact same backdoor was making it’s way into Windows and they only found it because it was on Linux first.
@MultiBannanaSHITTTT7 ай бұрын
@@TheExoryderIf this happened in Windows, you’d have known a couple months after the breach, there was a breach… No idea how affected you were.
@eswarm12348 ай бұрын
Please do a video on pre-commit framework
@GitGuardian8 ай бұрын
Sure thing @eswarm1234
@Moon-v5x8 ай бұрын
Thanks for the insight
@ElenaBiriuchevskaia8 ай бұрын
Thank you! Very well explained!
@robQW5UgexX8 ай бұрын
thanks!
@terryjones97848 ай бұрын
Why do you need os then?
@GitGuardian8 ай бұрын
The secrets are stored in the os environment so you need to call os to interact with them. env_var = os.environ
@scarlettjoehandsome61308 ай бұрын
Remember that Putin and his minions are Supported by Trump and his Idiots. We can never have national security with the backward regressive atavistic Republicans in power.
@lizelswick38339 ай бұрын
They can rot
@silliesthag9 ай бұрын
that’s really scary. there are so many organizations, businesses and individuals that use microsoft services. could the windows operating system be affected? and if so, will my passwords be safe if i save them on chrome or should i move them to a whole different device like my iphone’s password manager?
@GitGuardian9 ай бұрын
Right now it doesn't appear that the attack has affected any Microsoft core products. It would be extremely difficult for the attackers to infect the operating systems of users, they would need to inject malware into an update and right now they do not appear to have sufficient access to be able to do that, it is also not likely they will be able to get that access (but not impossible)
@MrUmban9 ай бұрын
Amazing explanation. Thank you!
@windfishletusdream10 ай бұрын
great video
@darshsundar54410 ай бұрын
were the cloudfare lava lamps bypassed or is it a different area
@0xSCMD10 ай бұрын
2:38 - Attackers were not (and are not) able to gain persistant access from the read only tokens that were compromised.
@GitGuardian10 ай бұрын
It is if it allows you to gather more data for instance discover more secrets. Also there is no evidence (at least not publicly) that the 4 secrets stolen from okta were read only, especially considering they were able to manipulate Jire Script Runner