2 pointsby kernelrocks9 hours ago2 comments
  • binoycyber9 hours ago
    What good is a VDP if the infrastructure is visible to the entire internet to begin with?

    Exposed keys are a symptom; the real problem is infrastructure that's reachable from the public internet in the first place. The reason this keeps happening is that the standard solutions; VPNs and static IP whitelisting, have enough friction that small teams implement them poorly or skip them entirely.

    If your backend systems aren't publicly reachable, a leaked key has nowhere to go. The secret leaks — but the infrastructure doesn't. The exception is services like S3 that are inherently public-facing — those still need their own access controls regardless.

    I've been building something that tackles this directly (dynamic firewall management — writes your team's live IPs to security groups on login, removes them on logout). Happy to share more if anyone's curious.

  • rvz9 hours ago
    Probably vibe-coded their infrastructure.

    Many such cases.