Loading video player...
🔒 Ever committed an API key to your repo by mistake? In this video, I explore the Sensitive Keys in Codebases challenge from Kubernetes Goat, a deliberately vulnerable Kubernetes environment designed for security learning. 🚀 We’ll go step-by-step through how secrets can end up exposed in source code, how attackers find them, and how to prevent these common DevSecOps slip-ups. 💡 You’ll learn: How sensitive data gets exposed in Git repositories Tools and techniques to detect leaked secrets How Kubernetes Goat simulates real-world security pitfalls Best practices to secure credentials in CI/CD pipelines 🧠 Perfect for: Developers, Cloud Engineers, Ethical Hackers, and anyone exploring Kubernetes security. 🔗 Resources: Kubernetes Goat: https://github.com/madhuakula/kubernetes-goat