GitHub EXPOSES your SECRETS by DESIGN!!!

Поделиться
HTML-код
  • Опубликовано: 16 сен 2024
  • Did you know that your secrets may be exposed BY DESIGN!!! Thanks GitHub!
    🛒 Gear Links 🛒
    Ugreen Nexode 3 65W Charger deal: amzn.to/4d3eQyZ
    * 🍏💥 New MacBook Air M1 Deal: amzn.to/3S59ID8
    * 💻🔄 Renewed MacBook Air M1 Deal: amzn.to/45K1Gmk
    * 🎧⚡ Great 40Gbps T4 enclosure: amzn.to/3JNwBGW
    * 🛠️🚀 My nvme ssd: amzn.to/3YLEySo
    * 📦🎮 My gear: www.amazon.com...
    🎥 Related Videos 🎥
    * 🌗 RAM torture test on Mac - • TRUTH about RAM vs SSD...
    * 🛠️ LLaMA2 Local install on MacBook - • LLaMA2 Local install o...
    * 🛠️ FREE Local LLMs on Apple Silicon | FAST! - • FREE Local LLMs on App...
    * 🤖 INSANE Machine Learning on Neural Engine - • INSANE Machine Learnin...
    * 🛠️ Developer productivity Playlist - • Developer Productivity
    🔗 AI for Coding Playlist: 📚 - • AI
    Post: trufflesecurit...
    - - - - - - - - -
    ❤️ SUBSCRIBE TO MY RUclips CHANNEL 📺
    Click here to subscribe: / @azisk
    - - - - - - - - -
    Join this channel to get access to perks:
    / @azisk
    - - - - - - - - -
    📱 ALEX ON X: / digitalix
    #github #llm #ai

Комментарии • 84

  • @reatcas
    @reatcas 27 дней назад +1

    Now that's sticking by your principles, that's true open source

  • @ht9ir
    @ht9ir Месяц назад +15

    This "feature" is probably outright illegal under GDPR regulations, the spirit of which says "delete means delete." Security considerations aside, I suspect this might be the result of a design oversight-a.k.a. cutting corners-from GitHub's early days, that is now very hard to change due to how it might have made its way into how the data is stored. Changing this might require some monster data migration. Let's not forget that GitHub was once a startup run by young people with little experience, not one of the backbones of the global software and internet industry that it is today.

    • @benjiro8793
      @benjiro8793 Месяц назад +3

      Not probably, its illegal! Not just for the delete function but also that your data is openly scrapable with this "backdoor".

    • @jotch_7627
      @jotch_7627 Месяц назад

      ​@@benjiro8793you published the data and gave github a license to publicly host it. its not illegal for them to host it. what a reactionary take...

    • @jakx2ob
      @jakx2ob Месяц назад

      Is this even personal data under the GDPR?

  • @BrazenNL
    @BrazenNL Месяц назад +19

    Wow, it really is by design …

  • @RockTheCage55
    @RockTheCage55 Месяц назад +19

    & now your forked :)

  • @tahaali01
    @tahaali01 Месяц назад +6

    This is crazy, it really is Open Source !

    • @reatcas
      @reatcas 27 дней назад

      😂😂😂😂😂

  • @THE_5335
    @THE_5335 Месяц назад +6

    I very much appreciate your new Vid, thanks!

  • @shapelessed
    @shapelessed Месяц назад +2

    Screw the forkpocalypse. The thing I've been missing in Github over the years was a super simple feature.
    Let me group my damn repos by category or by tag like you do with with issues!!!

  • @嘿嘿嘿-z1v
    @嘿嘿嘿-z1v Месяц назад +1

    Thanks for the information. Unbelievable it has such kind of bug…

  • @augustinomageka1352
    @augustinomageka1352 Месяц назад +7

    Great video Alex !

    • @AZisk
      @AZisk  Месяц назад

      Thanks!

  • @mehregankbi
    @mehregankbi Месяц назад +1

    The most serious part is the private repos. with public stuff, at least you know that once you make something public online, it's out there. but making a repo private and having all intellectual properties and secrets be still available publicly is a big NO-NO for enterprises.
    The commits done on the private repo AFTER it's been made private are still public. whose brilliant idea was this?

  • @jkristia9478
    @jkristia9478 Месяц назад +16

    wow, I had no idea. But, if you fork a public repo and keep it public, then there is really no harm done. But I agree, this is a surprising 'feature' of github

    • @duven60
      @duven60 Месяц назад

      you don't need to keep it public for this to work, it'll also work if you fork form a private repo and make a branch public (including things pushed to the still private repo post fork)

  • @ItsPinion
    @ItsPinion Месяц назад +1

    I don't believe that deleting the repository should be our first step for safety.
    Our first step should be revoking the API key as soon as possible.
    Why would we assume the damage hasn't already been done before we deleted the repo?

    • @MrVanshajSaxena
      @MrVanshajSaxena 17 дней назад +2

      What if it's not a password nor api key, but still private information?

  • @joristube
    @joristube Месяц назад +1

    Sounds like a fork is a branch. You can also not change visibility of certain clones

  • @andrewgrant788
    @andrewgrant788 Месяц назад +5

    So you revoke the key. You should never commit API keys of course and if you do you should always revoke the key. The fork behavior is surprising but if you fork an open source project but don’t want to contribute to the project you can just clone the repo and push to a new remote.

  • @cyberneo10
    @cyberneo10 29 дней назад

    That's crazy. So basically we shouldn't fork if we're not contributing to a project. Clone down and then create your own remote repo

  • @parshwa_1
    @parshwa_1 Месяц назад

    Didn't know it before, thanks for telling...

  • @petertillemans2231
    @petertillemans2231 Месяц назад +8

    Radical idea: do not store secret and personal information in a version control system?

    • @TheDrunkenAlcoholic
      @TheDrunkenAlcoholic Месяц назад +4

      it can happen unintentionally, I have done it myself when testing API's local on my PC and forgot all about it and pushed to the remote repo

    • @jotch_7627
      @jotch_7627 Месяц назад +2

      ​@@TheDrunkenAlcoholicanother radical idea: when it does get leaked, change it instead of wasting time trying to purge it from the internet. this is only *one* way that secrets can remain public, and its not the toughest one.
      this is like complaining about spilled milk on a ship that hit an iceberg instead of getting on a damn life boat

    • @TheDrunkenAlcoholic
      @TheDrunkenAlcoholic Месяц назад

      @@jotch_7627 I don't think that's so radical, its common sense, of cause you are going to change it....once you know about it..., but like I said no one intentionally pushes API's to github

    • @petertillemans2231
      @petertillemans2231 Месяц назад +1

      @@TheDrunkenAlcoholic We have all done it at one time if we're long enough in the game. But we feel bad for a while, revoke the key, remove it from the repo, vow to never do it again (till the next time). Most of us do not blame the technology or the technology providers because they are not cleaning up fast enough behind our messes.

  • @rch5395
    @rch5395 Месяц назад +2

    Remember, God's temple (temple os) doesn’t do this. What happens in temple os stays on temple os.

  • @Zagoorland
    @Zagoorland Месяц назад +1

    Microsoft always have to fuck things up…

  • @AaronBrooks0321
    @AaronBrooks0321 Месяц назад +25

    I mean...you gotta rotate the key

  • @NoobNotFoundDev
    @NoobNotFoundDev Месяц назад +5

    the title should be "How get OpenAI secret keys for free" lol

    • @NoobNotFoundDev
      @NoobNotFoundDev Месяц назад

      because we can make a program that catch all the events that has some 'secrets', then use them 💀
      jk we should never do this

    • @johnpremkumars2611
      @johnpremkumars2611 Месяц назад

      I think git guardian already does this

  • @rns10
    @rns10 Месяц назад

    Looks like github did it to save storage.
    So that they dont have to store the old commits of original repo in new forked repo.
    So when you search any branch or commit in forked repo, github goes to the original repo to find that branch and commit, instead of searching forked repo because it doesnt exist.
    And they forgot to stop this in other way around.

  • @OliveSpecs
    @OliveSpecs Месяц назад

    This happened to me as well 😂

  • @devluz
    @devluz Месяц назад

    Oh I ran into this problem without noticing. I cloned a repository with a subrepository and despite never changing the URL of the subrepository to my own fork it just worked. Maybe that is why they have this "feature" in the first place?

  • @gaiustacitus4242
    @gaiustacitus4242 Месяц назад

    GitHub cannot be trusted to never disclose or use your source code. If you want to keep your intellectual property private, then NEVER upload it onto a server that isn't under your direct control.

  • @milleniumdawn
    @milleniumdawn 5 дней назад

    You made a Fork, Fork are public, Fork cannot be made private, Fork are part of the original project.
    I dont see any issue being able to see Public code related to a project, whatever is from the original or the forked one.
    I dont understand the issue?

  • @imsarvesh_
    @imsarvesh_ Месяц назад +1

    OH MY LORD
    I am shocked

  • @GaffriJohnson1
    @GaffriJohnson1 Месяц назад

    So the leads me to the next question. Would this apply to on-prem version? I guess not, but then would an evil disgruntled internal developer be able to do something similar?

  • @mightybobka
    @mightybobka Месяц назад

    Oh, wow!

  • @BelarusianInUk
    @BelarusianInUk Месяц назад

    I would compare git commands generated for github and gitlab.

  • @recordtronic
    @recordtronic Месяц назад

    Is the commit visible from other accounts?

  • @Care2WorldBuild
    @Care2WorldBuild Месяц назад

    Any safety in clearing things using a git forced push? Does that leave history?

  • @AtishAbhang
    @AtishAbhang Месяц назад

    All forks of public repositories are public, by DESIGN!!

  • @EkoPurnomosaja
    @EkoPurnomosaja Месяц назад

    oh nooo, i love gitlab

  • @matthewtetley7048
    @matthewtetley7048 Месяц назад +1

    API keys should be in a . git ignore anyway when deployed, of you're learning its easy to not do it but pros shouldn't have them accessible anyway

  • @chiefolk
    @chiefolk Месяц назад

    Alex, was your fork private or public...?

  • @elrobotito
    @elrobotito Месяц назад +1

    Is it related to a GNU license? if you release the modified version to the public in some way, the GPL requires you to make the modified source code available to the program's users, under the GPL. I don't know if your repository was public or private. edit: yes, it's public, so github is forcing you to comply with GPL. Edit 2: no, whisper is MIT license

    • @maxrinehart4177
      @maxrinehart4177 Месяц назад +1

      since gitlab didn't follow the same steps I guess it's not related to open source licenses but incompetent from github team.

  • @2005sty
    @2005sty Месяц назад

    What is the purpose of this design decision? To protect the owner of the repo?

    • @yodamastera
      @yodamastera Месяц назад +1

      @@2005sty more like to be able to quickly fork massive repos in minimal time. You would want to wait 10-20-60 min for a fork to complete just to update the readme.
      Also once it is public it is public. You cannot just delete it and call it a day. Deleting it is absolutely the wrong way of thinking.

    • @2005sty
      @2005sty Месяц назад

      @@yodamastera I get your point

  • @swipekonme
    @swipekonme Месяц назад

    it's unfair, you tell the source in the last fifth of the vid, in effect usurping that person's find while still covering your a*

  • @jotch_7627
    @jotch_7627 Месяц назад +1

    this is a non-issue because the moment a secret is leaked, it is forever leaked. there is no going back. it does not matter how long the commit is visible or whether it goes away when you delete the forked repository because it is *leaked*. github is quite clear that theyll only bother with manual intervention when rotating the secret is not feasible.

    • @AZisk
      @AZisk  Месяц назад +1

      what about the private repos that the post goes into

  • @ramsey2155
    @ramsey2155 Месяц назад +2

    Who even pushes their secrets?
    Even in an accident, you can just regenerate the token

    • @precisionchoker
      @precisionchoker Месяц назад

      This is just an example of that flow
      Plus there are many people who accidentally put secrets on GitHub

    • @Mempler
      @Mempler Месяц назад +1

      It happens more often than it should... Even happened to me

    • @ramsey2155
      @ramsey2155 Месяц назад

      @@Mempler Did you later regenerate your secret or made a video about it?

    • @Mempler
      @Mempler Месяц назад

      @@ramsey2155 nah, i let people use it

  • @circumferenc
    @circumferenc Месяц назад +1

    That is what "fork" means. It creates a branch

  • @swiftpy
    @swiftpy Месяц назад

    F 😂😂 k man.. 🤣🤣🤣🤣🤣

  • @nil_at
    @nil_at Месяц назад

    4:50 Hash is F000 so if you start on 0000 you only need 16 tries to get here? What?! 😂

  • @epsig1507
    @epsig1507 Месяц назад +6

    I don't understand. You fork a public repo, which creates a public copy, and then you complain that the data is public? lol
    BTW the right thing to do after exposing a key is to disable/revoke the key, that's it

  • @Monkore
    @Monkore Месяц назад

    W

  • @sivasanthoshr.m2222
    @sivasanthoshr.m2222 Месяц назад

    When microsoft bought it i lost hope