GitHubThreat Intelligence
Third-Party Risk Intelligence: A Critical Vendor's GitHub Repo Exposed API Keys
May 10, 2025
Outcome
Exposed API keys detected; vendor notified; keys rotated within 4 hours; client data exposure prevented.
Background
A healthcare company subscribed to TraxinteL's Third-Party Risk Monitoring service, which continuously assesses the security posture of critical vendors. One vendor provided cloud-based patient scheduling software.
Investigation Methodology
- GitHub Monitoring: Public GitHub repositories associated with the vendor's engineering team were continuously monitored for sensitive data exposure — API keys, credentials, configuration files, and internal documentation.
- Leaked Secret Classification: Detected secrets were classified by type and severity — determining whether they provided access to production systems, test environments, or customer data.
- Impact Assessment: We assessed whether the exposed credentials could provide access to the client's data specifically.
Key Findings
- A vendor engineer committed a configuration file to a public GitHub repository containing 4 API keys and 2 database connection strings.
- One API key provided read access to the vendor's production API — which included the client's patient scheduling data.
- The commit had been public for 6 days before detection.
- The repository had been forked twice, indicating potential unauthorized access.
Outcome
The vendor was notified through the client's CISO. All exposed keys were rotated within 4 hours. An audit log review confirmed no unauthorized access had occurred during the 6-day exposure window. The vendor implemented pre-commit secret scanning. Detection speed: 6 days from exposure.