https://medium.com/bugbountywriteup/how-my-first-a...
Creato il: 6 novembre 2025
Risposto usando GPT-5 Thinking da Chat01
Creato il: 6 novembre 2025
Risposto usando GPT-5 Thinking da Chat01
Here’s a quick TL;DR of the piece you shared:
An appsec engineer (Andrew Keitany) decompiled an Android app (using apktool after consulting HackTricks methodology) and found an AWS secret key hard-coded in the app bundle. The post is dated Oct 7, 2025 and is published in InfoSec Write-ups on Medium. (Medium)
The core lesson: mobile apps must never embed long-term cloud credentials. Instead, use short-lived credentials and server-side token exchange; any exposed key should be treated as compromised and revoked immediately. (Google Play explicitly flags “exposed AWS credentials” and requires fixes.) (Google Help)
How people typically verify whether a found key is real (owner only, with permission): use AWS STS’s GetCallerIdentity to see which account/role the credentials belong to, then rotate/revoke. (No IAM permission is required to call this API, which is why exposed keys are so dangerous.) (AWS Documentation)
Why this matters (in practice)
A brief defender checklist
sts:GetCallerIdentity and review CloudTrail logs for the key’s activity. (AWS Documentation)If you want, I can also pull out implementation-ready hardening steps for Android (e.g., recommended auth flow patterns) or summarize the article’s methodology in more detail.