Join us at KubeCon + CloudNativeCon Europe 2025! Our team will be presenting groundbreaking research on cybersecurity in the cloud-native ecosystem—don’t miss our talk. We’d love to connect! Schedule a meeting with us to discuss how we can collaborate and innovate together. See you there! 🚀
ExCeL London
ExCeL London
Join us at KubeCon + CloudNativeCon Europe 2025! Our team will be presenting groundbreaking research on cybersecurity in the cloud-native ecosystem—don’t miss our talk. We’d love to connect! Schedule a meeting with us to discuss how we can collaborate and innovate together. See you there! 🚀
Hardcoded secrets remain a common practice in containerized environments, often used for convenience during testing or deployment, despite their significant, well-known security risks.
Docker images are not immune and can inadvertently leak secrets through Dockerfiles, configuration files, or image layers. Once pushed to registries such as DockerHub, these secrets become discoverable to attackers, putting environments at risk.
In this session, we will share insights from an extensive analysis of 180,000 public Docker images retrieved from DockerHub, uncovering a staggering number of 35,000 secrets from 18,000 images. More than 6,000 of these secrets were valid when the study was conducted in late 2024, including AWS keys, GCP keys, OpenAI tokens, and GitHub tokens belonging to Fortune 500 companies.
Finally, we will discuss common misuses and pitfalls in Dockerfile files that lead to secrets being leaked, and describe best practices for handling secrets in Docker images.
Join GitGuardian and their crew!