Skip to content

Secret exposed in environment.yml #36

@driesejr

Description

@driesejr

Find more live information in Aikido here: https://app.aikido.dev/queue?sidebarIssue=16937379&groupId=39961&sidebarIssueTask=1526650&sidebarTab=tasks

Scope

This task includes issues in the following code repository:

TLDR

We detected secret *****b5_0 in the git history of the repository. The secret was found in environment.yml.
View commit:

- keyring=23.4.0=py310hecd8cb5_0

How to fix

If this API key is harmless, you can ignore this issue. If not, we would advise to move the secret out of the git repository by either injecting it via the environment or even better, by using a tool such as AWS Secrets Manager to inject the secrets at run-time. After that, it should be possible to invalidate the current secret and regenerate a new one.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions