I had a critical path traversal vulnerability in a project which allowed attackers to leak the entire ../../../proc/self/environ
file. Apart from my own .env vars, there were AWS keys, I assume added by Vercel:
AWS_ACCESS_KEY_ID=AS_______A
AWS_SECRET_ACCESS_KEY=Vp_______t
AWS_SESSION_TOKEN=[long session token string]
I’m in the process of rotating all my keys, but those belong to Vercel, so I can’t do that myself. I changed region in Functions, which I think could do something, but I don’t know how to verify that. The only way I can think of is to put the vulnerability back in, and use it myself to see if new leaked keys are the same ones as previous.
What are my options here? Or is changing functions region guaranteed to do this?