Developer Screen Sharing Security: Protect API Keys, Credentials & Code
As a developer, you share your screen constantly - pair programming sessions, code reviews, debugging with colleagues, tech interviews, demos, and live coding streams. Each time, you risk exposing sensitive information that could compromise security or embarrass you professionally.
What Developers Need to Protect
1. API Keys and Secrets
The most dangerous exposure. API keys for services like AWS, Stripe, Twilio, and OpenAI can be exploited within seconds of being seen on stream.
# .env file - NEVER show this on screen
AWS_ACCESS_KEY_ID=AKIA...
AWS_SECRET_ACCESS_KEY=wJal...
STRIPE_SECRET_KEY=sk_live_...
DATABASE_URL=postgres://user:password@host/db
2. Environment Variables
Running env or printenv on screen can expose your entire environment configuration. Terminal history can also reveal previous commands that contained secrets.
3. Database Contents
When debugging, you might query production data that contains PII, customer information, or sensitive business data.
4. Source Code
Proprietary algorithms, business logic, and trade secrets in your codebase shouldn't be visible during casual screen shares.
5. Configuration Files
Files like config.yaml, settings.json, or docker-compose.yml often contain embedded credentials.
6. Git History
Running git log or git diff might reveal commits that contain (or removed) sensitive information.
Developer-Specific Risks During Screen Shares
IDE and Editor Integrations
Your IDE might display:
- Recently opened files (including .env and config files)
- Saved passwords in database tool windows
- Git credentials in source control panels
- Extension authentication tokens
Terminal Dangers
- Command history showing previous secret-containing commands
- PS1 prompts revealing username, hostname, or path information
- SSH connections showing server names and IPs
- Output from commands like
cat .envorecho $SECRET
Browser Developer Tools
- Network tab showing API keys in request headers
- Application/Storage tab showing tokens in localStorage
- Console output with debug information
Best Practices for Developer Screen Sharing
Before the Session
- Use dummy/local credentials - Never work with production secrets during screen shares
- Close sensitive files - Close all .env, config, and credential files
- Clear terminal history - Run
history -cor start a fresh terminal - Use a demo database - Never query production data on screen
- Check your file tree - Collapse directories that might contain sensitive files
- Close database management tools - DBeaver, pgAdmin, etc.
IDE Configuration
- Disable recent files - Or at least review what's in your recent files list
- Use a presentation mode - Many IDEs have a "Zen mode" that hides side panels
- Check your extensions - Some extensions display sensitive information
- Use a separate profile - Create a "screen share" profile with clean history
Git Best Practices
- Use .gitignore - Ensure sensitive files are never tracked
- Use git-secrets - Prevent committing secrets in the first place
- Be careful with git commands -
git stash show,git log -p, etc. can reveal secrets
Pair Programming Security
Pair programming is where developers share screens most frequently. Here's how to stay safe:
Live Share and Collaborative Tools
VS Code Live Share, JetBrains Code With Me, and similar tools let you share specific files rather than your entire screen:
- Use
.vsliveshare.jsonto exclude sensitive files - Share only the workspace you're collaborating on
- Use read-only mode when appropriate
Terminal Sharing
When sharing terminals:
- Use a fresh terminal session with no history
- Set up aliases for sensitive commands that obscure the actual secrets
- Consider using tmux or screen with careful window management
Tech Interview Screen Sharing
Technical interviews often require screen sharing. Special considerations:
Before the Interview
- Use a clean browser profile
- Close all non-interview applications
- Use a dedicated coding environment (or online IDE provided by interviewer)
- Clear terminal history
- Close any job search tabs (awkward to show during an interview!)
During the Interview
- Stick to the coding environment provided
- Avoid opening your usual development setup
- Don't access your personal/work projects
Live Coding and Streaming
If you stream coding on Twitch, YouTube, or similar platforms:
Stream-Safe Setup
- Use OBS window capture - Only capture your IDE window
- Create a "streaming" workspace - Separate from your regular work
- Use example/demo credentials - Never use real API keys
- Set up scene switching - Quick switch to a "BRB" scene if needed
- Use privacy software - Blur sensitive areas automatically
Automated Protection for Developers
Manual precautions help, but developers need automated protection that doesn't slow down their workflow. DeepBlur provides:
- Persistent blur zones - Automatically blur areas where secrets might appear
- IDE integration - Works with VS Code, JetBrains IDEs, and more
- Terminal protection - Blur specific terminal regions
- Quick toggle - Enable/disable with a hotkey
- Presets - Different configurations for pair programming vs. demos
Code Without Worry
DeepBlur protects your credentials and sensitive code during pair programming, code reviews, and live coding.
Download Free TrialEmergency Response
If you accidentally expose credentials on screen:
Immediate Actions
- Stop sharing - End the screen share immediately
- Don't panic visibly - Stay calm
- Rotate the secret - Change the exposed credential ASAP
- Check usage - Review logs for unauthorized access
- Notify security team - If applicable, report the incident
Post-Incident
- Audit other credentials that might have been visible
- Review and improve your screen sharing practices
- Consider implementing secret scanning in your CI/CD pipeline
- Set up automated secret rotation
Conclusion
Developer screen sharing carries unique security risks that can have serious consequences. By following best practices, using proper tooling, and maintaining awareness during screen shares, you can collaborate effectively while keeping your credentials and code secure.
Remember: one exposed API key can cost you or your company thousands of dollars and hours of incident response. Invest in proper screen share security.
← Back to DeepBlur