Skip to content

Commit 950b2a3

Browse files
HaroenvChALkeR
authored andcommitted
fix typo
fishing -> phishing
1 parent 4350b23 commit 950b2a3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

Gathering-weak-npm-credentials.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ If your token/password was revoked, it means that at least one of these cases ha
1919
1. You packaged your npm credentials inside an npm package — in this case, npm now revokes your credentials automatically.
2020
2. You published your token/password online yourself, e.g. uploaded it to a public GitHub repo, saved it in the CI logs, pasted to GitHub Gist, or did something similar.
2121
3. You were using a very weak password — though the extent to what I tried matching that depended on the overall downloads/month that you control, all of those were at the top part of weak password lists.
22-
4. You were reusing an old password that leaked from another site (e.g. through breaches, fishing, or anything) and your login+password or email+password combination is present in the public databases that basically anyone could download, and that could be used by malicious players.
22+
4. You were reusing an old password that leaked from another site (e.g. through breaches, phishing, or anything) and your login+password or email+password combination is present in the public databases that basically anyone could download, and that could be used by malicious players.
2323

2424
**Once again — that is not a false alarm, change that password on every other site where you use it.** I was able to obtain it in cleartext by working with publicly available data.
2525

0 commit comments

Comments
 (0)