Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Upon execution, the malware downloads and runs TruffleHog to scan the local machine, stealing sensitive information such as NPM Tokens, AWS/GCP/Azure credentials, and environment variables.

Even a properly containerized app will still have these things, because you need things like environment variables (that contain passwords, api keys, etc) for your app to function.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: