A free tool is now available to scan public GitHub repositories for exposed AWS credentials. Security engineer Anmol Singh Yadav created AWS-Key-Hunter after discovering over 100 exposed AWS access keys, many with high privileges, in public repositories. He described these findings as “just waiting to be exploited” in his blog about the tool.
Leaked security keys can allow criminals to take over cloud accounts and access AWS resources. This can result in theft of computing power, illegal cryptocurrency mining, data breaches, ransom demands, and unauthorized changes to system settings.
By infosecbulletin
/ Thursday , March 27 2025
OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
By infosecbulletin
/ Thursday , March 27 2025
Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
By infosecbulletin
/ Thursday , March 27 2025
As the Eid holidays near, cybercriminals may try to take advantage of weakened security during this time. The CTI unit...
Read More
By infosecbulletin
/ Wednesday , March 26 2025
Operations at Kuala Lumpur International Airport (KLIA) were unaffected by a cyber attack in which hackers demanded US$10 million (S$13.4...
Read More
By infosecbulletin
/ Wednesday , March 26 2025
Unofficial patches are available for a new Windows zero-day vulnerability that allows remote attackers to steal NTLM credentials by deceiving...
Read More
By infosecbulletin
/ Wednesday , March 26 2025
On Tuesday, VMware issued an urgent fix for a security flaw in its VMware Tools for Windows. CVE-2025-22230 allows a...
Read More
By infosecbulletin
/ Tuesday , March 25 2025
Kubernetes users of the Ingress NGINX Controller are advised to fix four newly found remote code execution ( RCE) vulnerabilities,...
Read More
By infosecbulletin
/ Tuesday , March 25 2025
Next.js, a widely used React framework for building full-stack web applications, has fixed a serious security vulnerability. Used by many...
Read More
By infosecbulletin
/ Sunday , March 23 2025
A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud servers. The stolen data includes...
Read More
By infosecbulletin
/ Saturday , March 22 2025
Operation Zero, a Russian zero-day broker, is offering up to $4 million for Telegram exploits. They seek $500K for one-click...
Read More
Real-Time Alerting via Discord Webhooks:
The tool uses Discord’s webhook API to send instant notifications to a set channel. When it detects valid credentials, AWS-Key-Hunter sends a POST request with repository metadata and partial key details.
Security teams can tailor alert thresholds and set up automated key rotation using AWS Lambda integrations.
To deploy AWS-Key-Hunter:
Generate GitHub personal access token with repo scope
Configure Discord webhook URL in .env
Launch via Docker
Build the Docker image:

Run the container:

AWS-Key-Hunter regularly checks target repositories for exposed AWS keys in plaintext and base64 formats. When it finds a key, it immediately alerts a specific Discord channel.
Check Point Flaw Used to Deploy ShadowPad and Ransomware