top | item 46630060

(no title)

aszen | 1 month ago

I wonder why we are even storing secrets in .env files in plain text

discuss

order

makoto12|1 month ago

This wouldn't have made the front page if it was: "How to not store your secrets in plain text"

patapong|1 month ago

I would also prefer not doing this. Does anyone know of any lightweight, cross platform alternatives?

phrotoma|1 month ago

Perhaps I'm off base here but it seems like the goal is:

1. allow an agent to run wild in some kind of isolated environment, giving the "tight loop" coding agent experience so you don't have to approve everything it does.

2. let it execute the code it's creating using some credentials to access an API or a server or whatever, without allowing it to exfil those creds.

If 1 is working correctly I don't see how 2 could be possible. Maybe there's some fancy homomorphic encryption / TEE magic to achieve this but like ... if the process under development has access to the creds, and the agent has unfettered access to the development environment, it is not obvious to me how both of these goals could be met simultaneously.

Very interested in being wrong about this. Please correct me!

WhyNotHugo|1 month ago

If your .env file is being sourced by something like direnv, you can have it read secrets from the secret storage service and export them as env vars.

If you bind-mount the directory, the sandbox can see the commands, but executing them won’t work since it can’t access the secret service.

johnisgood|1 month ago

I would like an answer, too.