Skip to content

Security-related question about a possible exposed credential #2964

@Emma-NYL

Description

@Emma-NYL

Hello,

My name is Emma, I am conducting an academic study on possible credential exposure in public GitHub repositories.

While analyzing this repository, I found a string that may represent a credential. I'm including the code snippet below containing possible leakage. To avoid exposing sensitive information publicly, I marked the sensitive information.

Could you please help clarify whether the detected string is:

  1. a real credential, or
  2. a placeholder / example value?

Thank you for your time.


Code snippet (sensitive values masked):

                Multiple-table syntax:

                UPDATE [LOW_PRIORITY] [IGNORE] table_references
            SET col_name1={expr1|DEFAULT} [, col_name2={expr2|DEFAULT}] ...
            [WHERE where_condition]
            
            update user, tuser set user.name='d****',tuser.pwd='a****' 
            where user.id=2 and tuser.id=0;
         * @param sql update tuser set pwd='a****', name='d****' where id=0;
         * @return
         */
        public static String convertUpdateSQL(String sql){
                try{

Thank you in advance for your time - I really appreciate it!

Sincerely,
Emma

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions