
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
@abacus-network/infra
Advanced tools
external-secrets-gcp
This Helm chart contains some resources that allow other workloads on the cluster to access secrets from GCP secret manager. The out-of-the-box external-secrets
Helm chart (see here) should also be deployed on the cluster prior to this chart being deployed. The resources in this chart generally follow the external-secrets documentation for using GCP Secret Manager (see here).
This chart has two resources:
gcp-sa-secret.yaml
- This is a vanilla opaque Secret that contains the keys to a service account with the roles/secretmanager.secretAccessor
role granted.cluster-secret-store.yaml
- This is a ClusterSecretStore, which is an external-secrets CRD that can be used by ExternalSecrets in any namespace on the cluster to access GCP Secret Manager secrets. This resource uses the service account credentials in the gcp-sa-secret.yaml
Secret to interact with GCP.As of now, the GCP service account that's used by the ClusterSecretStore to access GCP Secret Manager secrets can get any secret. This means that anyone with the ability to deploy infrastructure on the cluster can read all secrets. We should consider restricting which secrets that an environment's service account can access-- e.g. all secrets prefixed by the environment, or possibly a curated list.
GCP service account credentials are static and long-living, which is really unattractive. The leading alternative is workload identity, which doesn't require static and long-living credentials. For now, the GCP service account approach was used for the following reasons:
Regardless, workload identities are a more attractive long-term option, and moving to them should be relatively easy.
The documentation is the best source. In short, it allows Kuberenetes Secrets to get their secrets from an external secret provided (like GCP's Secret Manager), all without a developer/deployer needing to touch the secrets themselves.
The general idea is there are SecretStore
s (or ClusterSecretStore
s, which are the cluster-wide version), that specify how the cluster can authenticate with the external secret provider. ExternalSecret
s can then be specified in "application" infrastructure, which allow developers to specify a template for a Secret that will be created using the secret values from the external provider (& using the credentials from the SecretStore).
FAQs
Infrastructure utilities for the Abacus Network
We found that @abacus-network/infra demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.