Cloudant is a document-oriented and distributed database running on IBM Cloud. The service can be accessed via API calls. An optional authentication method requires a username and password. An alternate authentication method consists of a username and the corresponding apikey.
Step 1: Revoke the exposed secret.
The secret can be revoked from the IBM Cloudant dashboard in the Service credentials tab.
Step 2: Clean the git history.
Go under the settings section of your GitHub project and chose the change visibility button at the bottom.
Step 3: Inspect LogDNA logs to ensure the key was not utilized during the compromised period.
Updated about 1 year ago