Non-Human Identities Surge, Exposing Massive Software Security Risks

Article Highlights
Off On

The rapid evolution of non-human identities (NHIs) within the realm of software security has led to the emergence of significant security blind spots. NHIs, including service accounts, microservices, and AI agents, now significantly outnumber human users, vastly expanding attack surfaces for potential threat actors.

Rising Secret Leaks

Escalation of Exposed Secrets

23.77 million new secrets were leaked on GitHub, marking a 25% increase from the previous year. This substantial rise is directly linked to the expanded deployment of NHIs. These machine-based credentials are indispensable to modern infrastructure, yet their management often falls short, leading to critical security vulnerabilities. In DevOps environments, machine identities surpass human identities by at least 45-to-1, and when mismanaged, they exacerbate the growing attack landscape, creating novel challenges for cybersecurity professionals.

Persistent Credential Exposure

A critical concern highlighted in the report is the persistence of exposed credentials. An analysis reveals that 70% of secrets detected in public repositories in 2022 remain active, pointing to severe systemic failures in credential rotation and management. This persistent exposure indicates a pressing need for improved practices in managing and rotating credentials to avert long-term vulnerabilities and exploitation risks. Organizations must prioritize the automation and regular rotation of credentials, ensuring they do not remain active for extended periods, thus reducing the attack surface significantly.

Private Repositories and AI Complications

Security Misconceptions in Private Repositories

Despite a common belief that private repositories provide enhanced security, data tells a different story. Private repositories are approximately eight times more likely to contain secrets compared to their public counterparts. This situation suggests that many organizations rely on a false sense of security through obscurity rather than robust secrets management protocols. The report elucidates the types of secrets commonly leaked in private versus public repositories, revealing that generic secrets make up 74.4% of all leaks in private repositories but only 58% in public repositories. This demonstrates that developers tend to cut corners in seemingly protected environments, which poses substantial risks.

AI’s Role in Secret Leaks

The proliferation of AI coding assistants such as GitHub Copilot has further complicated these security issues. Repositories employing Copilot show a 40% higher incidence rate of secret leaks than those without AI assistance. While AI-powered development tools can boost productivity, they may inadvertently push developers to prioritize speed over security. This rush can result in credentials being embedded in ways that traditional coding practices might avoid, leading to significant security vulnerabilities. It’s crucial for developers to maintain a balance between achieving productivity gains and ensuring robust security measures are upheld.

Broader Impact and Oversight Issues

Docker Images and Container Security

GitGuardian’s extensive analysis of 15 million public Docker images from Docker Hub uncovered over 100,000 valid secrets, including AWS keys, GCP keys, and GitHub tokens belonging to Fortune 500 companies. Notably, 97% of these valid secrets were identified in image layers, with a majority appearing in layers smaller than 15MB. The prominence of ENV instructions, which accounted for 65% of all leaks, underscores significant oversights in container security practices. Organizations need to adopt stricter measures to scan and manage secrets within container images, ensuring these powerful tools do not become significant security liabilities.

Exposures Beyond Code Repositories

Secret leaks extend beyond traditional code repositories; collaboration platforms like Slack, Jira, and Confluence have emerged as significant vectors for credential exposure. The secrets found on these platforms tend to be more critical, with 38% of incidents classified as highly critical or urgent, compared to 31% in source code management systems. The lack of security controls within collaboration tools and inadvertent leaks by users from various departments exacerbates these issues. Additionally, only 7% of the secrets found in collaboration tools also appeared in the code base, complicating the problem further and highlighting the need for specialized scanning tools.

Excessive Permissions and Inadequacies of Current Solutions

The Burden of Broad Permissions

One major factor contributing to the problem is the excessive permissions associated with leaked credentials. 99% of GitLab API keys had either full access (58%) or read-only access (41%). Similarly, 96% of GitHub tokens provided write access, with 95% offering full repository access. These broad permissions greatly increase the potential damage that leaked credentials can inflict, enabling attackers to move laterally within systems and escalate privileges with relative ease. Organizations must enforce stricter permission protocols, ensuring that credentials are issued with the minimum required access to mitigate potential threats.

Inadequate Secret Management

Despite the increased use of secret management solutions, the report emphasizes that these tools alone cannot address the systemic issue. Even repositories utilizing secrets managers experienced a 5.1% incidence rate of leaked secrets in 2024. Addressing this issue necessitates a comprehensive strategy that encompasses the entire secrets lifecycle. Organizations need to implement automated detection systems, swift remediation processes, and integrate security measures throughout the development workflow to build a robust defense against secrets sprawl.

Call for Comprehensive Security Measures

Holistic and Proactive Approaches

In an era dominated by automated deployments, AI-generated code, and rapid application development, reactive and fragmented approaches to secrets management are no longer sufficient. Organizations must embrace holistic and proactive measures to ensure stringent practices in managing machine identities and their credentials. This approach entails not only leveraging advanced management tools but also cultivating a security-centric culture that prioritizes proper secrets management across all tiers of software development and operations. Continuous education and training on secrets management for all stakeholders are imperative to fortify defenses.

Imperative to Fortify Defenses

The rapid advancement of non-human identities (NHIs) in software security has given rise to major security blind spots. NHIs, which include service accounts, microservices, and artificial intelligence agents, now greatly outnumber human users, significantly broadening the attack surfaces that potential threat actors can exploit.

As software environments become more complex, the sheer volume of NHIs introduces new challenges in managing and securing these secrets. NHIs necessitate unique security protocols, differing significantly from those designed for human users. This imbalance creates opportunities for cybercriminals to infiltrate systems through vulnerabilities associated with NHIs. Consequently, organizations must adopt advanced security measures to mitigate these risks, ensuring that the integrity of their systems is maintained in light of the expanding digital landscape.

Explore more

How Will Embedded Finance Reshape Procurement and Supply?

In boardrooms that once debated unit costs and lead times, a new variable now determines advantage: the ability to move money, data, and decisions in one continuous motion across procurement and supply operations, and that shift is redefining benchmarks for visibility, control, and supplier resilience. Organizations that embed payments and financing directly into purchasing workflows are reporting meaningfully better results—stronger

What Should Your 2025 Email Marketing Audit Include?

Tailor Jackson sat down with Aisha Amaira, a MarTech expert known for marrying CRM systems, customer data platforms, and marketing automation into revenue-ready programs. Aisha approaches email audits like a mechanic approaches a high-mileage engine: measure, isolate, and fix what slows performance—then document everything so it scales. In this conversation, she unpacks a full-system approach to email marketing audits: technical

Can Precision and Trust Fix Tech’s B2B Email Performance?

The B2B Email Landscape in Tech: Scale, Stakeholders, and Significance Inboxes felt endless long before today’s flood, yet email still directs how tech buyers move from discovery to shortlist and, ultimately, to pipeline-worthy conversations. It remains the most trusted direct channel for B2B, particularly in SaaS, cybersecurity, infrastructure, DevOps, and AI/ML, where complex decisions demand a steady cadence of proof,

Noctua Unveils Premium NH-D15 G2 Chromax.Black Cooler

Diving into the world of high-performance PC cooling, we’re thrilled to sit down with Dominic Jainy, an IT professional whose deep knowledge of cutting-edge hardware and innovative technologies makes him the perfect guide to unpack Noctua’s latest release. With a career spanning artificial intelligence, machine learning, and blockchain, Dominic brings a unique perspective to how hardware like CPU coolers impacts

How Is Monzo Redefining Digital Banking with 14M Users?

In an era where digital solutions dominate financial landscapes, Monzo has emerged as a powerhouse, boasting an impressive 14 million users worldwide. This staggering figure, achieved with a record 2 million new customers in just six months by September of this year, raises a pressing question: what makes this UK-based digital bank stand out in a crowded FinTech market? To