Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

security: Circle CI Dec 22, 2022 Breach Incident #2927

Closed
kitten opened this issue Jan 14, 2023 · 0 comments
Closed

security: Circle CI Dec 22, 2022 Breach Incident #2927

kitten opened this issue Jan 14, 2023 · 0 comments

Comments

@kitten
Copy link
Member

kitten commented Jan 14, 2023

See for Incident Report

Related: urql-graphql/urql-devtools#402

ℹ️ Note: After a quick scan, I've determined that no user-affecting secrets have been stored in Circle CI. The environment variables stored there do not contain any npm credentials or anything else. This is purely an incident affecting infrastructure accounts for the documentation.

Summary

Circle CI has reported that on December 22, 2022 attackers had access to their systems and were potentially able to extract stored data, encrypted at rest, and — more importantly — encryption keys from any running system. As far as I'm aware, this potentially affects any environment variable secret that is stored in Circle CI.

Procedure

As a safety precaution, I'd like to make sure we invalidate and rotate every secret that was stored in Circle CI which affect this repository.

We have no reason to believe any secrets were actually exposed or compromised just yet, but there's no excuse for us not to proactively rotate them.

Task

This repository has not used Circle CI actively. As such, old secrets are contained within Circle CI that are only related to the urql documentation, specifically a restricted AWS key and a Surge API token.

The secrets listed on Circle CI are:

  • AWS_SECRET_ACCESS_KEY (For publishing production docs)
  • SURGE_TOKEN (For publishing staging/preview docs)

These secrets should be invalidated as soon as someone is available to do so.
There's less of an urgency to this than for urql-devtools as this affects no user machines.

cc @JoviDeCroock @gksander @ryan-roemer

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant