RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Dev & DevSecOpsOctober 12, 2022

DevOps lesson from Toyota FAIL: Crash test secrets

Toyota stands accused of lax DevOps standards, as the company reveals it stored prod database credentials in a public GitHub repo. That’s bad enough, but it also took five years to detect and fix.

Richi Jennings
Richi Jennings, Independent industry analyst, editor, and content strategist.Richi Jennings
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
A silver 2017 Toyota Corolla undergoing a crash test, colliding head-on with a solid barrier. The front of the car is crumpled, side airbags are deployed, and the car bears labels from the Insurance Institute for Highway Safety. The scene takes place in a controlled indoor crash testing facility.

Toyota stands accused of lax DevOps standards, as the company reveals it stored prod database credentials in a public GitHub repo. That’s bad enough, but it also took five years to detect and fix.

Easy to mock, but could it happen to you? What DevOps processes do you use to prevent a similar incident? And do those processes have management support?

It’s not the first time this has happened. In this week’s Secure Software Blogwatch, we know it won’t be the last.

Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention: World of tomorrow.
 

Do: Detect daft devs defying doctrine

What’s the craic? Satoshi Sugiyama reports — “Toyota says about 296,000 pieces of customer info possibly leaked”:

“Possibility of spamming, phishing”

Toyota said 296,019 email addresses and customer numbers of those using T-Connect, a telematics service that connects vehicles via a network, were potentially leaked. … It added that third-party access "could not be completely ruled out." … The affected customers are individuals who signed up to the service's website using their email addresses since July 2017.

…

The Japanese automaker … cautioned that there is a possibility of spamming, phishing scams and unsolicited email messages being sent to the users' email addresses. [It] said a contractor that developed the T-Connect website accidentally uploaded parts of the source code with public settings.

Sounds like the details got mangled in reporting. Bill Toulas managed to uncover the real issue — “Access key exposed on GitHub”:

“GitHub has begun scanning published code for secrets”
An access key was publicly available on GitHub for almost five years. … This made it possible for an unauthorized third party to access the details of 296,019 customers between December 2017 and …  September 17, 2022, [when] the database's keys were changed.
…
This type of security incident has become a large-scale problem that places troves of sensitive data at risk of exposure. … This is typically the result of developer negligence, storing credentials in the code to make asset fetching, service access, and configuration updating quick and easy while testing multiple app iterations. These credentials should be removed when the software is ready for actual deployment.
…
GitHub has begun scanning published code for secrets and blocking code commits that contain authentication keys to better secure projects. However, if a developer uses non-standard access keys or custom tokens, GitHub will not be able to detect them.

Ouch. How did it happen? Simon Sharwood says — “When your contractor leaks site source code”:

“Toyota-themed phishing”
The automaker … explains an outsourced developer tasked with building T-Connect uploaded the source code for the site to a GitHub public repo in December 2017. … Thankfully, the customer management numbers stored on the server aren't much use to third parties.

But email addresses are – especially if criminals decide to fire up some Toyota-themed phishing. Perhaps the car maker needs to scrutinize its own affairs more closely too, given it experienced a cyberattack in March 2022 that shuttered its plants, sold cars susceptible to losing wheels while in motion, and faked emissions data.

What a mess. chatterhead sounds slightly sarcastic:

Oh good, glad all the keys were changed and now the folks who had access for 5 years finally don't. Phew.

When are these companies going to realize we don't give a **** if phone numbers and credit cards are leaked - numbers can be changed and purchases can be rolled back. The exposure of 5 years of behavioral data on almost 300K people is the threat. Behavior dictates economics, politics, and everything in between. Behavioral data is what real manipulative models are built around

How can devs avoid this sort of SNAFU? u/sometimesanengineer suggests a little list:

To prevent publishing secrets:

• IDE side pre commit checks

• Pipeline check for secrets

• Periodically re-scanning your repos

• Training.

And, of course, fixing any problems as soon as you discover them. Unlike Toyota did. Jamesit asks the obvious question:

Why did it take two days to change the key? I thought changing the key would be a priority.

And what about the five years beforehand? TwistedGreen calls it “Massive Mismanagement”:

Not only did a developer have access to production database credentials containing customer data, but these credentials were not rotated in 5 years? Sorry, but the problem is way bigger than a "subcontractor messed up." Heads [should] roll for this.

Aye. There’s the rub. u/srgevipr argues that management must give space for devs to follow sound processes:

It's more culture than tools. … Everyone in a company should clearly understand the benefits. … Also, it should be supported by management to build it into the process.

Meanwhile, Toyota has a special place in drinkypoo’s heart:

This is the same Toyota where — when they were accused of unintended acceleration — a code review found that there were multiple code paths that could cause it, which were caused in part by Toyota engineers not … following Toyota's own coding standards — let alone well-established industry standards.

And Finally:

Welcome to the Outernet, Emily-prime. Now is the envy of all of the dead.

Hat tip: Oysdgp. More info: Wikipedia

Previously in And finally


You have been reading Secure Software Blogwatch by Richi Jennings. Richi curates the best bloggy bits, finest forums, and weirdest websites … so you don’t have to. Hate mail may be directed to @RiCHi or ssbw@richi.uk. Ask your doctor before reading. Your mileage may vary. Past performance is no guarantee of future results. Do not stare into laser with remaining eye. E&OE. 30.

Image sauce: IIHS.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Dev & DevSecOps

More Blog Posts

MCP security robot

Lab offers 9 ways to improve MCP security

The Vulnerable MCP Servers Lab delivers integration training, demos, and instruction on attack methods.

Learn More about Lab offers 9 ways to improve MCP security
Lab offers 9 ways to improve MCP security
AI coding new life for Rust

How AI coding is breathing new life into Rust 

AI tools are making Rust a favorite language of developers — even those maintaining codebases like Microsoft’s.

Learn More about How AI coding is breathing new life into Rust 
How AI coding is breathing new life into Rust 
Open-source software (OSS)

Anthropic’s PSF investment: Why it matters

Here’s what the $1.5M investment in the Python Software Foundation will mean for AI coding and open-source security.

Learn More about Anthropic’s PSF investment: Why it matters
Anthropic’s PSF investment: Why it matters
Software quality crisis

Software quality's decline: How AI accelerates it

Development is in freefall toward software entropy and insecurity. Can spec-driven development help?

Learn More about Software quality's decline: How AI accelerates it
Software quality's decline: How AI accelerates it

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top