Readit News logoReadit News
MattRogish · 13 years ago
bitops · 13 years ago
donretag · 13 years ago
That is not the only disturbing part. SSH private key by itself is not much of a threat, but bundled together with known_hosts is a recipe for disaster.
jrochkind1 · 13 years ago
Nothing new about that, you didn't need github's improved search to do it.

https://www.google.com/search?q=site%3Agithub.com+inurl%3A.s...

cryowaffle · 13 years ago
Or Bitcoin RPC password!
libria · 13 years ago
A hacker-with-a-heart-of-gold will write a script to harvest these emails and send them a warning message with a link to this thread.
beaumartinez · 13 years ago
The one time those spammy GitHub bots could be put to good use
sergiotapia · 13 years ago
That is terrifying, I just logged in with three separate accounts and they worked. Obviously I logged out without fucking around with anything; why mess with somebody's professional work.

This is dangerous. But then again, is it Github's responsibility to keep these people from shooting themselves in the foot?

brown9-2 · 13 years ago
is it Github's responsibility to keep these people from shooting themselves in the foot?

No.

driverdan · 13 years ago
Out of the ones I tried fb_secret seemed to have the most real results.

https://github.com/search?q=fb_secret&type=Code&ref=...

donretag · 13 years ago
donretag · 13 years ago
Someone is interested in what you and I have to say: https://github.com/ruggeri/hn-local-copy

Found via Github search

ARama · 13 years ago
I'm one of the students of App Academy ( which Ned Ruggeri is co-founder of ). The reason for that is because today one of the tasks was to create a version of HN in ou terminals. HN was blocking people due to repeated requests and thus Ned made a local version of HN for students to use.
tiktaktoe · 13 years ago
Creepy...

That's Ned Ruggeri, co-founder of App Academy (http://www.appacademy.io/). His HN account: http://news.ycombinator.com/user?id=ruggeri

vinhboy · 13 years ago
I think github should keep an active list of filters that they apply to all code submitted to their service.

Such as when it is a key file, or is a known credential file -- "amazon_s3.yml" for example, they should send a warning to the committer.

And then show a big red flag on the website if the repo is public.

And of course, remove the results from search.

I know it's not github's responsibility, but it would help make the web a bit safer.

benjamincburns · 13 years ago
It took me all of two seconds to think of the same thing, too. Here's hoping this is a big net win for parameterized security tokens.
orangethirty · 13 years ago
I found about that a short time ago while crawling github with Nuuton. A lot of people don't seem to be security aware. This is one of those things that search allows you to have fun with (by fun I mean be surprised, and by with I mean to only look and not use). You should see the stuff to be found on facebook.
puppymaster · 13 years ago
real "crypto_key" is pretty widespread as well :(
obeattie · 13 years ago
Thank goodness. This is the part of GitHub that has been driving me up the wall for months. Google is pretty useless in this area when you're looking for something buried within a repo.

Fantastic job, it works beautifully. Congratulations (to GitHub and to Elastic Search - I'm sure it's a big win for them too!)

ori_b · 13 years ago
This just reminds me of Google code search and makes me miss it more. Searching by regex was pretty useful.
tlrobinson · 13 years ago
I was hoping for regex support, but I guess it's pretty tough without Google-like scale.

Here's an interesting article describing how it worked: http://swtch.com/~rsc/regexp/regexp4.html

rquirk · 13 years ago
It still exists at https://code.google.com/codesearch though it no longer searches everything, only those repositories hosted on googlecode.com itself.
xfax · 13 years ago
Excellent feature. Thanks for making life a little better for a lot of us.

On a side note, I wonder how long before it'll be used to find security flaws in code (that results in an exploit) - I bet there are hundreds of hard-coded passwords, insecure defaults etc. all over the place.

aroman · 13 years ago
Is anyone impressed else by how quickly and successfully* GitHub has been rolling out new features over the past few months? I think almost every one of their new features has in some way made my life a little easier.

Kudos to the whole team.

* Granted, uptime might have been a causality.

slashclee · 13 years ago
I think you mean "casualty". :)
aroman · 13 years ago
Hah, yep, good catch. Damn you [manual] spelling correct ;)
benmanns · 13 years ago
This is pretty cool for finding local talent: https://github.com/search?l=Ruby&p=1&q=location%3A%2...
oelmekki · 13 years ago
Oh my. And suddenly, github gave grep to the web. Thanks for that great work.
ersii · 13 years ago
Here's.. a grep for the web, though: https://blekko.com/webgrep
dmit · 13 years ago
Or rather, fgrep. But it's still a welcome feature, and there's https://code.google.com/p/codesearch/ for locally available code.
ConstantineXVI · 13 years ago
`git grep` within repos as well
ghc · 13 years ago
Just took it for a spin. The implementation is fantastic.

Bravo, Github!