Skip to content

Conversation

@ujanjan
Copy link
Contributor

@ujanjan ujanjan commented Oct 7, 2025

Assignment Proposal

Title

Managing team secrets using Infisical and GitHub

Names and KTH ID

Deadline

  • Task 3

Category

  • Executable tutorial

Description

Managing environment secrets is crucial, especially for developers working in teams. In this tutorial, we want to utilize Infisical and GitHub to show the following scenario:

  1. Start with a condition where secrets are committed in plaintext to a GitHub repository

  2. How to set up Infisical's Secret Scanning to scan existing GitHub repository and prevent future vulnerabilities

  3. How to securely set up secrets in Infisical

  4. How to consume Infisical secrets in runtime and use it for your application

With this tutorial, we want to highlight the before (unmanaged/unsafe) vs after (managed/safe) condition. We plan to deliver our tutorial on KillerCoda.

Infisical is chosen in the tutorial as an open-source alternative to HashiCorp Vault to manage secrets that teams can self-host. However, in this tutorial, we will use their cloud solution which has a Free plan that can be used for the scenario.

Relevance

Managing secrets is central to DevSecOps because it reduces the risk of credential leaks and aligns security with delivery workflows.

Link to tutorial

The tutorial can be accessed here: https://killercoda.com/noizy-sthlm/scenario/scenario

@sofiabobadilla
Copy link
Collaborator

We have received the submission.

The tutorial will be graded in the upcoming weeks, and the grades will be reported on canvas.

Thank you for your work.

@sofiabobadilla sofiabobadilla merged commit 79586a2 into KTH:2025 Oct 9, 2025
3 checks passed
@sofiabobadilla sofiabobadilla self-assigned this Oct 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants