Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 61 — Secrets in Code: Management and Injection Avoidance

26:38
 
Share
 

Manage episode 505187667 series 3688683
Content provided by Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Embedding secrets directly in code is one of the most common and dangerous mistakes developers make. In this episode, we examine why hardcoding credentials, API keys, or tokens creates significant risks, including source code leaks, insider misuse, and automated discovery by attackers scanning repositories. We highlight the dangers of secrets being exposed in version control systems and explain why simply “hiding” them in configuration files is not enough. The secure approach is to externalize secrets and use managed vaulting solutions that integrate with development pipelines.

We also look at injection risks when secrets are mishandled in dynamic code, demonstrating how errors in variable substitution or environment configuration can compromise security. The CCSP exam may present scenarios where secrets are visible or poorly rotated, requiring you to identify the appropriate remediation. Understanding how to eliminate secrets from code ensures not only compliance but also resilience against the most preventable breaches. Produced by BareMetalCyber.com.

  continue reading

99 episodes

Artwork
iconShare
 
Manage episode 505187667 series 3688683
Content provided by Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Embedding secrets directly in code is one of the most common and dangerous mistakes developers make. In this episode, we examine why hardcoding credentials, API keys, or tokens creates significant risks, including source code leaks, insider misuse, and automated discovery by attackers scanning repositories. We highlight the dangers of secrets being exposed in version control systems and explain why simply “hiding” them in configuration files is not enough. The secure approach is to externalize secrets and use managed vaulting solutions that integrate with development pipelines.

We also look at injection risks when secrets are mishandled in dynamic code, demonstrating how errors in variable substitution or environment configuration can compromise security. The CCSP exam may present scenarios where secrets are visible or poorly rotated, requiring you to identify the appropriate remediation. Understanding how to eliminate secrets from code ensures not only compliance but also resilience against the most preventable breaches. Produced by BareMetalCyber.com.

  continue reading

99 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play