Skip to main content
NEW: RSAC 2026 NHI Field Report — How Non-Human Identity became cybersecurity's central axis
Back to Blog
Tag

NHI Security

27 posts
Expired Credentials That Still Work: The Zombie Key Problem (NHI Kill Chain #5)
Apr 14, 2026

Expired Credentials That Still Work: The Zombie Key Problem (NHI Kill Chain #5)

Secret scanning alert: Resolved. Credential status: Active. Deleting a secret from code is not the same as revoking it. Inside the Zombie Key kill chain.

Ben Kim
Ben Kim
Team Member
Over-privileged API Keys: When One Credential Unlocks Too Much (NHI Kill Chain #4)
Apr 11, 2026

Over-privileged API Keys: When One Credential Unlocks Too Much (NHI Kill Chain #4)

A single Stripe API key was copied to 14 locations over three years. When a QA repo went public, the key was exposed — and revoking it meant breaking 14 services simultaneously.

Ben Kim
Ben Kim
Team Member
Unrotated API Keys: Why Years-Old Credentials Still Run Production (NHI Kill Chain #3)
Apr 10, 2026

Unrotated API Keys: Why Years-Old Credentials Still Run Production (NHI Kill Chain #3)

A single AWS key, never rotated for 3 years, spread across 7 systems. When a supply chain attack hit a Terraform CI plugin, the key gave attackers full infrastructure access. Inside the Aged Key kill chain and how to defend against long-lived credentials.

Ben Kim
Ben Kim
Team Member
Shadow Service Accounts: Detecting Undocumented Machine Identities (NHI Kill Chain #2)
Apr 5, 2026

Shadow Service Accounts: Detecting Undocumented Machine Identities (NHI Kill Chain #2)

A single production outage left credentials in six non-code platforms — Slack, Jira, Confluence, Sentry, Datadog, and PagerDuty. Your secret scanner found none of them. Inside the Shadow Key kill chain.

Ben Kim
Ben Kim
Team Member
Orphaned API Keys: The Security Risk of Credentials With No Owner (NHI Kill Chain #1)
Apr 2, 2026

Orphaned API Keys: The Security Risk of Credentials With No Owner (NHI Kill Chain #1)

A departed developer's AWS key stayed active for 92 days. When an infostealer hit their personal laptop, the key was sold on the dark web. Inside the Ghost Key kill chain and how to defend against orphaned credentials.

Ben Kim
Ben Kim
Team Member
When the Security Scanner Became the Weapon — A Cyber Kill Chain Analysis of the Trivy Supply Chain Attack
Mar 25, 2026

When the Security Scanner Became the Weapon — A Cyber Kill Chain Analysis of the Trivy Supply Chain Attack

Aqua Security's Trivy was compromised by TeamPCP, cascading into LiteLLM. A 7-phase Cyber Kill Chain and MITRE ATT&CK analysis of how incomplete credential rotation turned a single breach into a five-ecosystem catastrophe.

Ben Kim
Ben Kim
Team Member
Publicly Exposed API Keys: What Happens When Credentials Reach Open Repos (NHI Kill Chain #7)
Mar 17, 2026

Publicly Exposed API Keys: What Happens When Credentials Reach Open Repos (NHI Kill Chain #7)

A .env file pushed to a public GitHub repo is found by attacker bots in 4 minutes. We map the full kill chain — from credential exposure to infrastructure compromise and show how to detect and respond before the damage is done.

Ben Kim
Ben Kim
Team Member
How a Single GitHub Issue Title Compromised 4,000 Developer Machines
Mar 7, 2026

How a Single GitHub Issue Title Compromised 4,000 Developer Machines

A prompt injection in a GitHub Issue title hijacked Cline's AI triage bot, stole npm tokens, and silently installed a rogue AI agent on 4,000 developer machines. The era of AI-installing-AI supply chain attacks has arrived.

Ben Kim
Ben Kim
Team Member
The 2025 Cybersecurity Landscape: Download the Full Report
May 29, 2025

The 2025 Cybersecurity Landscape: Download the Full Report

The 2025 Cybersecurity Landscape: Download the Full Report

Ben Kim
Ben Kim
Team Member
OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management
Apr 25, 2025

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management

Ben Kim
Ben Kim
Team Member
Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security
Apr 23, 2025

Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security

Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security

Ben Kim
Ben Kim
Team Member
OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans
Apr 22, 2025

OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans

OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans

Ben Kim
Ben Kim
Team Member
MCP and A2A: Why Non-Human Identity Security Matters in the AI Era
Apr 16, 2025

MCP and A2A: Why Non-Human Identity Security Matters in the AI Era

Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication are redrawing the NHI security boundary. What changes when AI agents become first-class identities in your infrastructure.

Ben Kim
Ben Kim
Team Member
Human vs. Non-Human Identity: The Key Differentiators
Apr 1, 2025

Human vs. Non-Human Identity: The Key Differentiators

Human vs. Non-Human Identity: The Key Differentiators

Ben Kim
Ben Kim
Team Member
Wake-Up Call: tj-actions/changed-files Compromised NHIs
Mar 25, 2025

Wake-Up Call: tj-actions/changed-files Compromised NHIs

Wake-Up Call: tj-actions/changed-files Compromised NHIs

Ben Kim
Ben Kim
Team Member
Behind the Code: Best Practices for Identifying Hidden Secrets
Mar 18, 2025

Behind the Code: Best Practices for Identifying Hidden Secrets

Behind the Code: Best Practices for Identifying Hidden Secrets

Ben Kim
Ben Kim
Team Member
OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview
Mar 3, 2025

OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview

OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview

Ben Kim
Ben Kim
Team Member
Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection
Feb 25, 2025

Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection

Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection

Ben Kim
Ben Kim
Team Member
Build vs. Buy: Making the Right Choice for Secrets Detection
Feb 25, 2025

Build vs. Buy: Making the Right Choice for Secrets Detection

Build vs. Buy: Making the Right Choice for Secrets Detection

Ben Kim
Ben Kim
Team Member
Bybit Hack Analysis: Strengthening Crypto Exchange Security
Feb 18, 2025

Bybit Hack Analysis: Strengthening Crypto Exchange Security

Bybit Hack Analysis: Strengthening Crypto Exchange Security

Ben Kim
Ben Kim
Team Member
OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks
Feb 18, 2025

OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks

OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks

Ben Kim
Ben Kim
Team Member
OWASP NHI3:2025 - Vulnerable Third-Party NHI
Feb 4, 2025

OWASP NHI3:2025 - Vulnerable Third-Party NHI

OWASP NHI3:2025 - Vulnerable Third-Party NHI

Ben Kim
Ben Kim
Team Member
6 Essential Practices for Protecting Non-Human Identities
Dec 5, 2024

6 Essential Practices for Protecting Non-Human Identities

6 Essential Practices for Protecting Non-Human Identities

Ben Kim
Ben Kim
Team Member
Introducing Probe! Cremit's New Detection Engine
Aug 3, 2024

Introducing Probe! Cremit's New Detection Engine

Introducing Probe! Cremit's New Detection Engine

Ben Kim
Ben Kim
Team Member
Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats
Apr 9, 2024

Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats

Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats

Ben Kim
Ben Kim
Team Member
Customer Interview: Insights from ENlighten
Mar 4, 2024

Customer Interview: Insights from ENlighten

Customer Interview: Insights from ENlighten

Ben Kim
Ben Kim
Team Member
Secret Sprawl and Non-Human Identities: The Growing Security Challenge
Oct 22, 2023

Secret Sprawl and Non-Human Identities: The Growing Security Challenge

Secret Sprawl and Non-Human Identities: The Growing Security Challenge

Ben Kim
Ben Kim
Team Member