正式なドキュメントは英語版であり、この日本語訳はAI支援翻訳により作成された参考用のものです。日本語訳の一部の内容は人間によるレビューがまだ行われていないため、翻訳のタイミングにより英語版との間に差異が生じることがあります。最新かつ正確な情報については、英語版をご参照ください。

Exposure of confidential secret or token Age secret key

Description

The response body contains content that matches the pattern of an age encryption secret key was detected. Age is a modern and secure file encryption tool, format, and Go library. It features small explicit keys, no configuration options, and UNIX-style composability. These keys are usually used for encrypting sensitive files. A malicious actor with access to this key can decrypt any file or message encrypted with it. Exposing this value could allow attackers to gain access to all resources granted by this token.

Remediation

For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on Credential exposure to the internet. To generate a new age key, run the following command: console age-keygen -o new_key.age Consider protecting the identity file with a passphrase. This may not be possible if this key is intended to be used in automated systems: console age-keygen | age -p > new_key.age

Details

IDAggregatedCWETypeRisk
798.4false798PassiveHigh