Pulumi Access Token
ID |
pulumi_token |
Severity |
critical |
Vendor |
Pulumi |
Family |
API Token |
Description
Pulumi’s open source infrastructure as code SDK enables you to create, deploy, and manage infrastructure on any cloud, using your favorite languages.
They provide a command line client that requires an access token to log into.
Security
Any hardcoded Pulumi Access Token is a potential secret reported by this detector.
Accidentally checking-in the token to source control repositories could compromise the Pulumi account and data.
Examples
- name: Install Jenkins hosts: jenkins vars: ansible_user: centos ansible_ssh_private_key_file: keys/servers/centos.pem roles: - role: pulumi vars: - pulumi_token: pul-4764sdfkh34wd584754569665633
Mitigation / Fix
-
Follow your policy for handling leaked secrets, which typically require revoking the secret in the target system(s). Go to Tokens, find the specific token and revoke it.
-
Remove the token from the source code or committed configuration file. The token should be read from either a secret vault, a file not under version control, or an environment variable.
You should consider any sensitive data in commits with secrets as compromised. Remember that secrets may be removed from history in your projects, but not in other users' cloned or forked repositories. |
Reference
-
Pulumi Secrets, for handling secrets in Pulumi itself.
-
How to handle secrets on the command line, for recommendations on how to pass the token to pulumi command.