Skip to content

Security-related question about a possible exposed credential #6

@Emma-NYL

Description

@Emma-NYL

Hello,

My name is Emma, I am conducting an academic study on possible credential exposure in public GitHub repositories.

While analyzing this repository, I found a string that may represent a credential. I'm including the code snippet below containing possible leakage. To avoid exposing sensitive information publicly, I marked the sensitive information.

Could you please help clarify whether the detected string is:

  1. a real credential, or
  2. a placeholder / example value?

Thank you for your time.


Code snippet (sensitive values masked):

#define RD_BLOCK_SIZE 128
#define REFRESH_MIN 15 // refresh every 15 minutes (developer account 500 calls/day -->max 20 calls per hour)
#define DEBUG_LEVEL 0  // 0 = disable ; 1 = INFO ; 2 = DEBUG

// Settings
// create yourself a (free) developer account on wunderground website; it can handle up to 500 calls/day for free.
char* apiKey   = "YOUR****-KEY";         // your personal 8 hex characters api key from your account at Wunderground (need to request this key once !)
char* location = "YOUR****ATION";        // your location
char* host     = "api.wunderground.com"; // The API URL in orde to get this working you need to use a DNS server


// Global variables
char value[50];

Thank you in advance for your time - I really appreciate it!

Sincerely,
Emma

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions