🔑 The exposed API keys

Improper assets management

It's Tuesday morning and your developer mentions they've open-sourced part of your frontend code on GitHub to build credibility with the developer community.

An hour later, you get an alert that your API usage has spiked to 50x normal levels.

Checking the logs, you see thousands of requests from IP addresses around the world, all using your production API keys.

You realise with horror that the GitHub repository includes a config file with your live API keys, database URLs, and third-party service credentials.

Technical Issue: Production API keys were hardcoded in configuration files that got committed to a public repository. Automated bots scan GitHub constantly for exposed credentials and immediately exploit them.

What's your immediate first move?

← Select different scenario