(no title)
neandrake | 6 months ago
However their response doesn't remediate putting secrets into environment variables in the first place - that is apparently acceptable to them and sets off a red flag for me.
neandrake | 6 months ago
However their response doesn't remediate putting secrets into environment variables in the first place - that is apparently acceptable to them and sets off a red flag for me.
KingOfCoders|6 months ago
Everything else was fine, just this one tool chosen by the security researcher out of a dozen of tools was not sandboxed.
darkwater|6 months ago
shlomo_z|6 months ago
Isn't that standard? The other options I've seen are .env files (amazing dev experience but not as secure), and AWS Secrets Manager and similar competition like Infisical. Even in the latter, you need keys to authenticate with the secrets manager and I believe it's recommended to store those as env vars.
Edit: Formatting
vmatsiiako|6 months ago
Kriptonian|6 months ago
[deleted]
Jap2-0|6 months ago