On the topic of hardcoded credentials - I was just left with an open debug shell on the Linux OS on one of our UCS Fabric Interconnects after a session with Cisco TAC, and now I'm wondering why the user "samdme" (a reserved user name according to the documentation) has a non-restricted bash shell and a key in its ssh authorized_keys file...

@galaxis i think this is totally common... you just dont usually see it
Sign in to participate in the conversation
INFRa Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!