{"id":596,"date":"2024-04-16T15:43:41","date_gmt":"2024-04-16T15:43:41","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/16\/aws-google-and-azure-cli-tools-could-leak-credentials-in-build-logs\/"},"modified":"2024-04-16T15:43:41","modified_gmt":"2024-04-16T15:43:41","slug":"aws-google-and-azure-cli-tools-could-leak-credentials-in-build-logs","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/16\/aws-google-and-azure-cli-tools-could-leak-credentials-in-build-logs\/","title":{"rendered":"AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs"},"content":{"rendered":"<p>\u200bNew cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud can expose sensitive credentials in build logs, posing significant risks to organizations.<br \/>\nThe vulnerability has been codenamed\u00a0LeakyCLI\u00a0by cloud security firm Orca.<br \/>\n&#8220;Some commands on Azure CLI, AWS CLI, and Google Cloud CLI can expose sensitive information in\u00a0New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud can expose sensitive credentials in build logs, posing significant risks to organizations.<br \/>\nThe vulnerability has been codenamed\u00a0LeakyCLI\u00a0by cloud security firm Orca.<br \/>\n&#8220;Some commands on Azure CLI, AWS CLI, and Google Cloud CLI can expose sensitive information in\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bNew cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud can expose sensitive credentials in build logs, posing significant risks to organizations. The vulnerability has been codenamed\u00a0LeakyCLI\u00a0by cloud security firm Orca. &#8220;Some commands on Azure CLI, AWS CLI, and Google Cloud CLI can expose sensitive information in\u00a0New&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/16\/aws-google-and-azure-cli-tools-could-leak-credentials-in-build-logs\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":597,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/596"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=596"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/596\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/597"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}