Field Note 07 – Builder Lessons
This is what I think builders should take from it.
The technical mistake was simple: long-term cloud credentials do not belong in a mobile application package. The engineering lesson is broader: build systems should make this class of mistake hard to ship.
If a secret ships in a client app, assume it is public. The remediation path should start with revocation and log review, then move to architecture: replace static client credentials with backend-mediated access or temporary credentials appropriate to the workload.
AWS's IAM guidance emphasizes temporary credentials for workloads where possible, least privilege, access review, and safe handling of access keys when long-term credentials are unavoidable.
The practical controls are familiar: secret scanning, code review checks, build artifact review, narrow IAM policy scope, CloudTrail review, and a release process that treats mobile binaries as public artifacts.
Useful references: AWS IAM security best practices and AWS access key management guidance.
