Background
The monitoring system detected an API Key from a mobile project exposed in a public code hosting platform.
Response Process
- Impact Assessment ā Check Key permission scope, associated projects, and call logs
- Immediate Mitigation ā Immediately add IP and Referrer restrictions
- Key Rotation ā Create new Key, configure minimal permissions (3 APIs + package name SHA-1)
- Update Application ā Update new Key to configuration, trigger deployment
- Deprecate Old Key ā Delete old Key after confirming new Key is working
- Multi-dimensional Verification ā Functional testing, old Key invalidation confirmation, permission check
- Generate Report ā Automatically upload to Confluence
Results
- Fully automated throughout, zero business interruption
- New Key permissions reduced from 40+ APIs to 3
Technical Highlights
- First step after leak is mitigation (add restrictions), not immediate deletion
- Rotation requires deploying new Key first, then deprecating old Key after confirmation ā ClawNOC Operations Agent Practice Notes