You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
The Atlassian Community can help you and your team get more value out of Atlassian products and practices.
You have accidentally committed a file containing sensitive data.
Security researchers and threat actors alike are actively scanning hosted git repositories like yours, looking for passwords, secrets, and other useful configuration info potentially hiding in your data.
There are several free and openly available tools to automate the discovery of sensitive data across services like Bitbucket Cloud.
Using information found in publicly accessible repositories, attackers can then access and compromise your services and systems, often without your knowledge.
Unfortunately, the process to backtrack a mistake like this is not as straightforward as removing the lines or files in question, so we've outlined some steps for you below.
You should take the following actions as soon as possible:
Remove the file with the sensitive content from repository, for more details please refer to: https://stackoverflow.com/questions/2047465/how-can-i-delete-a-file-from-a-git-repository
Once the file is removed, you need to make sure you remove it from the repository history as well, it can be done by using the BFG repo cleaner: https://rtyley.github.io/bfg-repo-cleaner/
Push the cleaned repository to Bitbucket remote and raise a support ticket for us to run the GC on the repository (https://support.atlassian.com/contact/#/)
To avoid adding and committing sensitive files back to the repository in the future, we highly recommend adding those file to .gitignore, that way you are sure you do not expose your credentials publicly: https://www.atlassian.com/git/tutorials/saving-changes/gitignore
Rotate any passwords, keys or other credentials to avoid any malicious use following the exposure.
Perform thorough review of all your repositories to ensure any sensitive keys, passwords or other data have been removed. If necessary repeat the steps above to remove any additional files and re-write the repository history.
Some further reading on this topic: