paint-brush
GitGuardian Report: 70% Of Leaked Secrets Remain Active For Two Years, Urging Immediate Remediationby@cybernewswire
New Story

GitGuardian Report: 70% Of Leaked Secrets Remain Active For Two Years, Urging Immediate Remediation

by CyberNewswire
CyberNewswire HackerNoon profile picture

CyberNewswire

@cybernewswire

The world's leading cybersecurity press release distribution platform.

March 11th, 2025
Read on Terminal Reader
Read this story in a terminal
Print this story
Read this story w/o Javascript
Read this story w/o Javascript
tldt arrow
en-flagEN
Read this story in the original language, English!
tr-flagTR
Bu hikayeyi Türkçe okuyun!
es-flagES
Lee esta historia en Español!
ja-flagJA
この物語を日本語で読んでください!
qu-flagQU
Ñawinchay kay willakuyta en quechua!
sn-flagSN
Verenga nyaya iyi muShona!
uk-flagUK
Читайте цю історію українською!
ro-flagRO
Citiți această poveste în limba română!
bg-flagBG
Прочетете тази история на български!
he-flagHE
קרא את הסיפור הזה בעברית!
sw-flagSW
Soma hadithi hii kwa kiswahili!
hu-flagHU
Olvasd el ezt a történetet magyarul!
sr-flagSR
Прочитајте ову причу на српском!
EN

Too Long; Didn't Read

GitGuardian's State of Secrets Sprawl Report reveals 25% increase in leaked secrets year-over-year. 70% of secrets leaked in 2022 remain active today, creating an expanding attack surface. 35% of all private repositories scanned contained at least one plaintext secret.

People Mentioned

Mention Thumbnail

Business Blogging

@businessblogging

Companies Mentioned

Mention Thumbnail
BeyondTrust
Mention Thumbnail
Even

Coin Mentioned

Mention Thumbnail
Toncoin
featured image - GitGuardian Report: 70% Of Leaked Secrets Remain Active For Two Years, Urging Immediate Remediation
1x
Read by Dr. One voice-avatar

Listen to this story

CyberNewswire HackerNoon profile picture
CyberNewswire

CyberNewswire

@cybernewswire

The world's leading cybersecurity press release distribution platform.

0-item

STORY’S CREDIBILITY

Press Release

Press Release

This is a PR written by or for the company mentioned within it. The writer has a vested interest in the company and products mentioned within.

**BOSTON, USA, March 11th, 2025/CyberNewsWire/--**GitGuardian, the security leader behind GitHub's most installed application, today released its comprehensive "2025 State of Secrets Sprawl Report," revealing a widespread and persistent security crisis that threatens organizations of all sizes. The report exposes a 25% increase in leaked secrets year-over-year, with 23.8 million new credentials detected on public GitHub in 2024 alone. Most concerning for enterprise security leaders: 70% of secrets leaked in 2022 remain active today, creating an expanding attack surface that grows more dangerous with each passing day.


"The explosion of leaked secrets represents one of the most significant yet underestimated threats in cybersecurity," said Eric Fourrier, CEO of GitGuardian. "Unlike sophisticated zero-day exploits, attackers don't need advanced skills to exploit these vulnerabilities—just one exposed credential can provide unrestricted access to critical systems and sensitive data."Eric Fourrier points to the 2024 U.S. Treasury Department breach as a warning: "A single leaked API key from BeyondTrust allowed attackers to infiltrate government systems. This wasn't a sophisticated attack—it was a simple case of an exposed credential that bypassed millions in security investments."

Key Findings for Security Leaders

The report identifies several critical trends that demand immediate attention:

The Blind Spot: Generic Secrets

Despite GitHub's Push Protection helping developers detect known secret patterns, generic secrets—including hardcoded passwords, database credentials, and custom authentication tokens—now represent more than half of all detected leaks. These credentials lack standardized patterns, making them nearly impossible to detect with conventional tools.

Private Repositories: A False Sense of Security

The analysis reveals a startling truth: a full 35% of all private repositories scanned contained at least one plaintext secret, shattering the common assumption that private repositories are secure:

  • AWS IAM keys appeared in plaintext in 8.17% of private repositories—over 5× more frequently than in public ones (1.45%)
  • Generic passwords appeared nearly 3× more often in private repositories (24.1%) compared to public ones (8.94%)
  • MongoDB credentials were the most frequently leaked secret type in public repositories (18.84%)


"Leaked secrets in private code repositories must be treated as compromised," emphasized Eric Fourrier. "Security teams must recognize that secrets should be treated as sensitive data regardless of where they reside."


Beyond Code: Secrets Sprawl Across the SDLC

Hardcoded secrets are everywhere, but especially in security blind spots like collaboration platforms and containers environments where security controls are typically weaker:

  • Slack: 2.4% of channels within analyzed workspaces contained leaked secrets
  • Jira: 6.1% of tickets exposed credentials, making it the most vulnerable collaboration tool
  • DockerHub: 98% of detected secrets were embedded exclusively in image layers, with over 7,000 valid AWS keys currently exposed

The Non-Human Identity Crisis

Non-human identities (NHIs)—including API keys, service accounts, and automation tokens—now vastly outnumber human identities in most organizations. However, these credentials often lack proper lifecycle management and rotation, creating persistent vulnerabilities.

A security leader at a Fortune 500 company acknowledged this challenge: "We aim to rotate secrets annually, but enforcement is difficult across our environment. Some credentials have remained unchanged for years."

Secrets Managers: Not a Complete Answer

Even organizations using secrets management solutions remain vulnerable. A study of 2,584 repositories leveraging secrets managers revealed a 5.1% secret leakage rate —far from the near-zero we anticipate. This surpasses the overall GitHub average of 4.6%.

Common issues include:

  • Secrets extracted from secrets managers and hardcoded elsewhere
  • Insecure authentication to secrets managers exposing access credentials
  • Fragmented governance due to secrets sprawl across multiple secrets managers

The Path Forward: Comprehensive Secrets Security

As AI-generated code, automation, and cloud-native development accelerate, the report forecasts that secrets sprawl will only intensify. While GitHub's Push Protection has reduced some leaks, it leaves significant gaps—particularly with generic secrets, private repositories, and collaboration tools.

"For CISOs and security leaders, the goal isn't just detection—it's the remediation of these vulnerabilities before they're exploited," said Eric Fourrier. "This requires a comprehensive approach that includes automated discovery, detection, remediation, and stronger secrets governance across all enterprise platforms."

The report concludes with a strategic framework for organizations to address secrets sprawl through:

  • Deploying monitoring for exposed credentials across all environments
  • Implementing centralized secrets detection and remediation
  • Establishing semi-automated rotation policies for all credentials
  • Creating clear developer guidelines for secure vault usage

To read the full 2025 State of Secrets Sprawl Report, users can visit GitGuardian.com.

Additional resources

GitGuardian - Website

The State of Secrets Sprawl 2025

About GitGuardian

GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance.


This dual approach enables the detection of compromised secrets across your dev environments while also managing non-human identities and their secrets' lifecycles. The platform is the world's most installed GitHub application and supports over 450+ types of secrets, offers public monitoring for leaked data, and deploys honeytokens for added defense. Trusted by over 600,000 developers, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF, and Bouygues Telecom for robust secrets protection.

Contact

Media Contact

Holly Hagerman

Connect Marketing

hollyh@connectmarketing.com

+1(801) 373-7888

This story was distributed as a release by Cybernewswire under HackerNoon’s Business Blogging Program. Learn more about the program here


L O A D I N G
. . . comments & more!

About Author

CyberNewswire HackerNoon profile picture
CyberNewswire@cybernewswire
The world's leading cybersecurity press release distribution platform.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Hackernoon
Bsky
Hackernoon
X
Threads
Bsky

Mentioned in this story

X REMOVE AD