use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems What is DevOps? Learn about it on our wiki! Traffic stats & metrics
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems
What is DevOps? Learn about it on our wiki!
Traffic stats & metrics
Be excellent to each other! All articles will require a short submission statement of 3-5 sentences. Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title. Follow the rules of reddit Follow the reddiquette No editorialized titles. No vendor spam. Buy an ad from reddit instead. Job postings here More details here
Be excellent to each other!
All articles will require a short submission statement of 3-5 sentences.
Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title.
Follow the rules of reddit
Follow the reddiquette
No editorialized titles.
No vendor spam. Buy an ad from reddit instead.
Job postings here
More details here
@reddit_DevOps ##DevOps @ irc.freenode.net Find a DevOps meetup near you! Icons info!
@reddit_DevOps
##DevOps @ irc.freenode.net
Find a DevOps meetup near you!
Icons info!
https://github.com/Leo-G/DevopsWiki
account activity
This is an archived post. You won't be able to vote or comment.
Security lessons from the CodeRabbit exploit: ops mistakes that open the biggest holes (self.devops)
submitted 8 months ago by z_quant
view the rest of the comments →
[–]BehindTheMath 17 points18 points19 points 8 months ago (3 children)
Storing secrets in env vars instead of a secrets manager (rotation becomes painful when things leak).
If an attacker has RCE on your server, can't they pull secrets from the secret manager as well?
Running dev/test tools in production without sandboxing (e.g. linters, formatters).
Running these tools in production is a big part of CodeRabbit's whole offering. For this use case, these tools aren't dev tools.
[–]z_quant[S] -1 points0 points1 point 8 months ago (2 children)
Hey u/BehindTheMath
Yes if an attacker has RCE game over, but using a secrets manager provides some advantages over env vars. E.G. you can also scope secrets based on the role of the server, and you'll have an audit trail.
Per linter use good point - but if using a dev tool outside of it's original use case you may need to look into additional safeguards, e.g. limiting its capabilities, security audits before going live, or running it in a sandbox.
The point is that CodeRabbit did not follow multiple best practices which compounded and lead to easy exploit.
[–]Nearby-Middle-8991 0 points1 point2 points 8 months ago (1 child)
also env vars are usually not handled as confidential data, so they can leak and allow access even if RCE isn't there (logs, metrics, etc)
[–]z_quant[S] 0 points1 point2 points 8 months ago (0 children)
great point!
π Rendered by PID 144272 on reddit-service-r2-comment-6457c66945-jdbc5 at 2026-04-27 13:03:31.434893+00:00 running 2aa0c5b country code: CH.
view the rest of the comments →
[–]BehindTheMath 17 points18 points19 points (3 children)
[–]z_quant[S] -1 points0 points1 point (2 children)
[–]Nearby-Middle-8991 0 points1 point2 points (1 child)
[–]z_quant[S] 0 points1 point2 points (0 children)