trast to HaveIBeenPwned, does not provide a result
in real-time but notifies the user via email to increase
confidentiality (Hasso Plattner Institute, 2021).
In reaction to data breaches, Google has integrated
Google Password Checkup (Thomas et al., 2019) into
Google Chrome browser’s password manager, and
Apple released a similar feature for its built-in pass-
word manager iCloud Keychain.
Overall, there is a substantial benefit of cre-
dential leak checkers and existing services focus
on password-based authentication. However, as
public-key authentication is a standard authentication
method, there is a need for a similar service dedicated
to private keys.
6 CONCLUSION
Leaked authentication keys are a threat to security and
should be revoked immediately. To act fast, it is of the
essence to find out if a private key has been publicly
exposed as soon as possible. We have demonstrated
that scanning the Internet for leaked keys is one way
to achieve awareness regarding key leakage. After
building an initial database of publicly available se-
cret keys, we implemented a service for users to check
their keys while also administrators may use this ser-
vice to test their clients’ keys. However, we only store
the fingerprints of discovered keys. The quality of our
implementation was measured to common standards.
We aim to achieve a collaboratively built database
of private authentication keys deemed insecure as
they have been revealed on the Internet with this
work. Therefore, the dataset can be extended by sub-
mitting URLs that we then scan for leaked keys. We
plan to continue this service and make its final im-
plementation available after publishing this work to
allow a community-driven, ongoing extension of the
dataset and to be up-to-date so that users may check
their keys regularly.
REFERENCES
Avizienis, A., Laprie, J.-C., Randell, B., and Landwehr, C.
(2004). Basic concepts and taxonomy of dependable
and secure computing. IEEE transactions on depend-
able and secure computing, 1(1):11–33.
AWS Labs (2019). awslabs/git-secrets: Prevents you from
committing secrets and credentials into git reposito-
ries. https://github.com/awslabs/git-secrets. (Ac-
cessed on 27/05/2022).
Ayrey, D. (2018). TruffleHog. https://github.com/dxa4481
/truffleHog. (Accessed on 27/05/2022).
Brown, S. (2021). The C4 model for visualising software
architecture. https://c4model.com/. (Accessed on
27/05/2022).
GitHub (2021). GitHub Docs: About secret scanning. https:
//docs.github.com/en/code-security/secret-security/a
bout-secret-scanning. (Accessed on 27/05/2022).
Hasso Plattner Institute (2021). Identity Leak Checker. ht
tps://sec.hpi.de/ilc/. (Accessed on 27/05/2022).
Henriksen, M. (2018). michenriksen/gitrob: Reconnais-
sance tool for GitHub organizations. https://github.c
om/michenriksen/gitrob. (Accessed on 27/05/2022).
Hunt, T. (2021). Pwned Passwords, Open Source in the
.NET Foundation and Working with the FBI. https://
www.troyhunt.com/pwned-passwords-open-source-i
n-the-dot-net-foundation-and-working-with-the-fbi/.
(Accessed on 27/05/2022).
Hunt, T. (2022). Have I Been Pwned: Check if your email
has been compromised in a data breach. https://have
ibeenpwned.com/. (Accessed on 27/05/2022).
ISO/IEC (2011). ISO/IEC 25010:2011 Systems and soft-
ware engineering — Systems and software Quality
Requirements and Evaluation (SQuaRE) — System
and software quality models.
Li, L., Pal, B., Ali, J., Sullivan, N., Chatterjee, R., and Ris-
tenpart, T. (2019). Protocols for Checking Compro-
mised Credentials.
Lonvick, C. M. and Ylonen, T. (2006). The Secure Shell
(SSH) Authentication Protocol. RFC 4252.
Meli, M., McNiece, M. R., and Reaves, B. (2019). How Bad
Can It Git? Characterizing Secret Leakage in Public
GitHub Repositories. In NDSS.
Price, P. (2019). eth0izzle/shhgit: Ah shhgit! Find GitHub
secrets in real time. https://github.com/eth0izzle/shh
git/. (Accessed on 27/05/2022).
Python Cryptographic Authority (2022). Cryptography. ht
tps://cryptography.io/. (Accessed on 27/05/2022).
Saha, A., Denning, T., Srikumar, V., and Kasera, S. K.
(2020). Secrets in Source Code: Reducing False Pos-
itives using Machine Learning. In 2020 International
Conference on COMmunication Systems NETworkS
(COMSNETS), pages 168–175. ISSN: 2155-2509.
Sinha, V. S., Saha, D., Dhoolia, P., Padhye, R., and Mani, S.
(2015). Detecting and Mitigating Secret-Key Leaks
in Source Code Repositories. In 2015 IEEE/ACM
12th Working Conference on Mining Software Repos-
itories, pages 396–400. IEEE.
Thomas, K., Pullman, J., Yeo, K., Raghunathan, A., Kelley,
P., Invernizzi, L., Benko, B., Pietraszek, T., Patel, S.,
Boneh, D., and Bursztein, E. (2019). Protecting ac-
counts from credential stuffing with password breach
alerting. In USENIX Security Symposium. Google
LLC.
ICSOFT 2022 - 17th International Conference on Software Technologies
656