Case study

Finding database passwords hidden in legacy network shares

A security team needed to understand whether years of shared folders contained credentials that were no longer tracked by application teams.

Example scenarioUse for SEO until real customer stories are available

Challenge

Hidden credentials outside controlled systems.

A security team needed to understand whether years of shared folders contained credentials that were no longer tracked by application teams.

What Onyxaris scanned

  • Shared project directories
  • ZIP archives
  • Configuration files
  • SQL scripts
  • Deployment notes
  • Backup folders

Findings

What the team discovered.

Database connection strings in old deployment folders

Context, exposure and remediation priority were captured for review.

Service account passwords in scripts

Context, exposure and remediation priority were captured for review.

API keys inside archived .env files

Context, exposure and remediation priority were captured for review.

Repeated credentials copied across multiple locations

Context, exposure and remediation priority were captured for review.

Outcome

Prioritized remediation and repeatable review.

The team gained a structured cleanup list, rotated high-risk credentials, removed obsolete copies and created a repeatable process for future scans.

BeforeAfter
Unknown credential exposureRisk-ranked findings by source
Manual folder reviewAutomated source scanning
No central evidenceDocumented remediation trail
Repository-only viewCross-source exposure visibility

Start focused

Run a similar exposure assessment.

Use Onyxaris to start with one high-risk source and build a practical remediation plan.

Request early access