Pulumi Access Token

ID

pulumi_token

Severity

critical

Vendor

Pulumi

Family

API Token

Description

Pulumi’s open source infrastructure as code SDK enables you to create, deploy, and manage infrastructure on any cloud, using your favorite languages.

They provide a command line client that requires an access token to log into.

Security

Any hardcoded Pulumi Access Token is a potential secret reported by this detector.

Accidentally checking-in the token to source control repositories could compromise the Pulumi account and data.

Examples

- name: Install Jenkins
  hosts: jenkins
  vars:
    ansible_user: centos
    ansible_ssh_private_key_file: keys/servers/centos.pem
  roles:
    - role: pulumi
      vars:
        - pulumi_token: pul-4764sdfkh34wd584754569665633

Mitigation / Fix

  1. Follow your policy for handling leaked secrets, which typically require revoking the secret in the target system(s). Go to Tokens, find the specific token and revoke it.

  2. Remove the token from the source code or committed configuration file. The token should be read from either a secret vault, a file not under version control, or an environment variable.

You should consider any sensitive data in commits with secrets as compromised.

Remember that secrets may be removed from history in your projects, but not in other users' cloned or forked repositories.

Reference