Suspicious Activity Alert
Publicly accessible Google API key for Google Cloud Platform project PLT Login (id: plt-login)
Dear Customer,
We have detected a publicly accessible Google API key associated with the following Google Cloud Platform project:
Project PLT Login (id: plt-login) with API key AIzaSyCgZQExEPcYFIUzqph8Ah_9LGNVv4mD1o0
The key was found at the following URL: https://www.pathlabtalk.com/forum/index.php?/topic/4398-cloudy-ffp/
We believe that you or your organization may have inadvertently published the affected API key in public sources or on public websites (for example, credentials mistakenly uploaded to a service such as GitHub.)
Please note that as the project/account owner, you are responsible for securing your keys. Therefore, we recommend that you take the following steps to remedy this situation:
If this key is intended to be public (or if a publicly accessible key isn’t preventable):
Log in to the Google Cloud Console and review the API and billing activity on your account, ensuring the usage is in line with what you expected.
Add API key restrictions to your API key, if applicable.
If this key was NOT meant to be public:
Regenerate the compromised API key: Search for Credentials in the cloud console platform, Edit the leaked key, and use the Regenerate Key button to rotate the key. For more details, review the instructions on handling compromised GCP credentials.
Take immediate steps to ensure that your API key(s) are not embedded in public source code systems, stored in download directories, or unintentionally shared in other ways.
Add API key restrictions to your API key, if applicable.
The security of your Google Cloud Platform account(s) is important to us.
GO TO MY CONSOLE
Sincerely,
Google Cloud Platform Trust & Safety