-
Notifications
You must be signed in to change notification settings - Fork 82
Open
Labels
PRPPatch Reward Program: This label is added to all PRP related issues for easy filteringPatch Reward Program: This label is added to all PRP related issues for easy filteringPRP:AcceptedPatch Reward Program: This issue has been accepted as a PRP entry.Patch Reward Program: This issue has been accepted as a PRP entry.
Description
-
Secret name: HashiCorp Cloud Platform (HCP) API keys
-
Risk in exposing the secret: HCP is a managed platform offering HashiCorp products-as-a-service. With exposed HCP API keys attackers can gain access to sensitive cloud resources, manage Vault secrets, provision infrastructure, escalate privileges, and potentially access or manipulate production data and billing information. Furthermore the secrets can be leveraged to access other services, such as cloud environments (GCP, Azure, and so on).
-
Validation method, if any:
- An access token can be created by calling the oauth2 token endpoint with
HCP_CLIENT_ID
andHCP_CLIENT_SECRET
. - With the
HCP_ACCESS_TOKEN
query the HCP API endpoints (such as the/v1/organizations
and/v1/projects
endpoints) to check if the exposed API key is able to access valid organization or project data. See additional details on IAM policy here.
- An access token can be created by calling the oauth2 token endpoint with
-
Resources:
Metadata
Metadata
Assignees
Labels
PRPPatch Reward Program: This label is added to all PRP related issues for easy filteringPatch Reward Program: This label is added to all PRP related issues for easy filteringPRP:AcceptedPatch Reward Program: This issue has been accepted as a PRP entry.Patch Reward Program: This issue has been accepted as a PRP entry.