Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Autoren

  • Alexander Krause
  • Jan H. Klemmer
  • Nicolas Huaman
  • Dominik Wermke
  • Yasemin Acar
  • Sascha Fahl

Externe Organisationen

  • Helmholtz-Zentrum für Informationssicherheit (CISPA)
  • Universität Paderborn
  • George Washington University
Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Titel des SammelwerksProceedings of the 32nd USENIX Security Symposium
Seitenumfang18
ISBN (elektronisch)978-1-939133-37-3
PublikationsstatusVeröffentlicht - 2023
Veranstaltung32nd USENIX Security Symposium - Anaheim, USA / Vereinigte Staaten
Dauer: 9 Aug. 202311 Aug. 2023

Abstract

Version control systems for source code, such as Git, are key tools in modern software development. Many developers use services like GitHub or GitLab for collaborative software development. Many software projects include code secrets such as API keys or passwords that need to be managed securely. Previous research and blog posts found that developers struggle with secure code secret management and accidentally leaked code secrets to public Git repositories. Leaking code secrets to the public can have disastrous consequences, such as abusing services and systems or making sensitive user data available to attackers. In a mixed-methods study, we surveyed 109 developers with version control system experience. Additionally, we conducted 14 in-depth semi-structured interviews with developers who experienced secret leakage in the past. 30.3% of our participants encountered code secret leaks in the past. Most of them face several challenges with secret leakage prevention and remediation. Based on our findings, we discuss challenges, such as estimating the risks of leaked secrets, and the needs of developers in remediating and preventing code secret leaks, such as low adoption requirements. We conclude with recommendations for developers and source code platform providers to reduce the risk of secret leakage.

ASJC Scopus Sachgebiete

Zitieren

Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories. / Krause, Alexander; Klemmer, Jan H.; Huaman, Nicolas et al.
Proceedings of the 32nd USENIX Security Symposium. 2023.

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Krause, A, Klemmer, JH, Huaman, N, Wermke, D, Acar, Y & Fahl, S 2023, Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories. in Proceedings of the 32nd USENIX Security Symposium. 32nd USENIX Security Symposium, Anaheim, California, USA / Vereinigte Staaten, 9 Aug. 2023. <https://www.usenix.org/conference/usenixsecurity23/presentation/krause>
Krause, A., Klemmer, J. H., Huaman, N., Wermke, D., Acar, Y., & Fahl, S. (2023). Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories. In Proceedings of the 32nd USENIX Security Symposium https://www.usenix.org/conference/usenixsecurity23/presentation/krause
Krause A, Klemmer JH, Huaman N, Wermke D, Acar Y, Fahl S. Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories. in Proceedings of the 32nd USENIX Security Symposium. 2023
Krause, Alexander ; Klemmer, Jan H. ; Huaman, Nicolas et al. / Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories. Proceedings of the 32nd USENIX Security Symposium. 2023.
Download
@inproceedings{1843b6660997418c8fd2e4a54acea941,
title = "Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories",
abstract = "Version control systems for source code, such as Git, are key tools in modern software development. Many developers use services like GitHub or GitLab for collaborative software development. Many software projects include code secrets such as API keys or passwords that need to be managed securely. Previous research and blog posts found that developers struggle with secure code secret management and accidentally leaked code secrets to public Git repositories. Leaking code secrets to the public can have disastrous consequences, such as abusing services and systems or making sensitive user data available to attackers. In a mixed-methods study, we surveyed 109 developers with version control system experience. Additionally, we conducted 14 in-depth semi-structured interviews with developers who experienced secret leakage in the past. 30.3% of our participants encountered code secret leaks in the past. Most of them face several challenges with secret leakage prevention and remediation. Based on our findings, we discuss challenges, such as estimating the risks of leaked secrets, and the needs of developers in remediating and preventing code secret leaks, such as low adoption requirements. We conclude with recommendations for developers and source code platform providers to reduce the risk of secret leakage.",
author = "Alexander Krause and Klemmer, {Jan H.} and Nicolas Huaman and Dominik Wermke and Yasemin Acar and Sascha Fahl",
note = "Funding Information: We want to thank all survey participants and interviewees for supporting our research. Furthermore, we thank the anonymous reviewers and our shepherd for their constructive feedback. This research was funded in part by the VolkswagenStiftung Nieders{\"a}chsisches Vorab – ZN3695, the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany{\textquoteright}s Excellence Strategy – EXC 2092 CASA – 390781972, and NSF grants CNS-2206865 and CNS-2207008. Any findings and opinions expressed in this material are those of the authors and do not necessarily reflect the views of the funding agencies.; 32nd USENIX Security Symposium, USENIX Security '23 ; Conference date: 09-08-2023 Through 11-08-2023",
year = "2023",
language = "English",
booktitle = "Proceedings of the 32nd USENIX Security Symposium",

}

Download

TY - GEN

T1 - Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories

AU - Krause, Alexander

AU - Klemmer, Jan H.

AU - Huaman, Nicolas

AU - Wermke, Dominik

AU - Acar, Yasemin

AU - Fahl, Sascha

N1 - Funding Information: We want to thank all survey participants and interviewees for supporting our research. Furthermore, we thank the anonymous reviewers and our shepherd for their constructive feedback. This research was funded in part by the VolkswagenStiftung Niedersächsisches Vorab – ZN3695, the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy – EXC 2092 CASA – 390781972, and NSF grants CNS-2206865 and CNS-2207008. Any findings and opinions expressed in this material are those of the authors and do not necessarily reflect the views of the funding agencies.

PY - 2023

Y1 - 2023

N2 - Version control systems for source code, such as Git, are key tools in modern software development. Many developers use services like GitHub or GitLab for collaborative software development. Many software projects include code secrets such as API keys or passwords that need to be managed securely. Previous research and blog posts found that developers struggle with secure code secret management and accidentally leaked code secrets to public Git repositories. Leaking code secrets to the public can have disastrous consequences, such as abusing services and systems or making sensitive user data available to attackers. In a mixed-methods study, we surveyed 109 developers with version control system experience. Additionally, we conducted 14 in-depth semi-structured interviews with developers who experienced secret leakage in the past. 30.3% of our participants encountered code secret leaks in the past. Most of them face several challenges with secret leakage prevention and remediation. Based on our findings, we discuss challenges, such as estimating the risks of leaked secrets, and the needs of developers in remediating and preventing code secret leaks, such as low adoption requirements. We conclude with recommendations for developers and source code platform providers to reduce the risk of secret leakage.

AB - Version control systems for source code, such as Git, are key tools in modern software development. Many developers use services like GitHub or GitLab for collaborative software development. Many software projects include code secrets such as API keys or passwords that need to be managed securely. Previous research and blog posts found that developers struggle with secure code secret management and accidentally leaked code secrets to public Git repositories. Leaking code secrets to the public can have disastrous consequences, such as abusing services and systems or making sensitive user data available to attackers. In a mixed-methods study, we surveyed 109 developers with version control system experience. Additionally, we conducted 14 in-depth semi-structured interviews with developers who experienced secret leakage in the past. 30.3% of our participants encountered code secret leaks in the past. Most of them face several challenges with secret leakage prevention and remediation. Based on our findings, we discuss challenges, such as estimating the risks of leaked secrets, and the needs of developers in remediating and preventing code secret leaks, such as low adoption requirements. We conclude with recommendations for developers and source code platform providers to reduce the risk of secret leakage.

UR - http://www.scopus.com/inward/record.url?scp=85176098582&partnerID=8YFLogxK

M3 - Conference contribution

BT - Proceedings of the 32nd USENIX Security Symposium

T2 - 32nd USENIX Security Symposium

Y2 - 9 August 2023 through 11 August 2023

ER -