secrets-management
Warn
Audited by Socket on Mar 18, 2026
1 alert found:
AnomalyAnomalyreferences/kubernetes-secrets.md
LOWAnomalyLOW
references/kubernetes-secrets.md
The YAML contains hardcoded sensitive credentials and configuration that enable secret exposure if committed to source control or if cluster/IAM permissions are too permissive. There is no direct malicious code (this is declarative config), but the manifest represents a significant operational security risk (credential leakage and potential AWS secret exfiltration via the ExternalSecrets operator if service account permissions are misconfigured). Immediate actions: treat these values as compromised, rotate secrets, remove secrets from repo, and audit RBAC/IAM for the external-secrets service account.
Confidence: 90%Severity: 60%
Audit Metadata