Hi,
An automated responsible-disclosure scan found pattern(s) matching the following API key type(s) in this file:
https://github.com/semgrep/semgrep-rules/blob/4f980f0bf591a26a85dd1540c0ef6aaaf4158c27/generic/secrets/security/detected-aws-session-token.txt
Keys detected
Recommended actions
- Revoke each key immediately using the links above
- Remove the key(s) from the file and commit the change
- Purge from git history — keys remain accessible in old commits even after deletion. Use
git filter-repo or BFG Repo Cleaner
- Rotate any dependent services that used these credentials
This is an automated alert. No keys were tested, validated, or used in any way. If this is a false positive, please close this issue.
Sent by a responsible disclosure scanner to help protect accidentally exposed credentials.
Note: A SECURITY.md was found in this repo — you may want to handle disclosure through that channel as well.
Hi,
An automated responsible-disclosure scan found pattern(s) matching the following API key type(s) in this file:
https://github.com/semgrep/semgrep-rules/blob/4f980f0bf591a26a85dd1540c0ef6aaaf4158c27/generic/secrets/security/detected-aws-session-token.txt
Keys detected
Recommended actions
git filter-repoor BFG Repo CleanerSent by a responsible disclosure scanner to help protect accidentally exposed credentials.
Note: A
SECURITY.mdwas found in this repo — you may want to handle disclosure through that channel as well.