You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
dotenv pull pulls an unencrypted .env file to the local file system.
While this file could be git-ignored, it would still contain secrets in plaintext sitting on the file system. This can make sense on production systems or CI agents, but it is not a secure practice for development machines (which can far more easily be compromised).
Before any project/application is launched, the secrets are loaded from memory / OS secure store, and then injected as environment variables to the process.
You could still maintain some "virtual" .env file where secrets can be browsed by the user ,but the key point would be that at no point that information is actually saved in plaintext on the hard drive.
The text was updated successfully, but these errors were encountered:
ohadschn
changed the title
dotenv pull to SecretStorage / memory
dotenv pull to SecretStorage / memory (do not persist secrets on disk)
Dec 3, 2023
dotenv pull
pulls an unencrypted.env
file to the local file system.While this file could be git-ignored, it would still contain secrets in plaintext sitting on the file system. This can make sense on production systems or CI agents, but it is not a secure practice for development machines (which can far more easily be compromised).
Instead, I suggest something similar to https://github.com/pomdtr/vscode-secrets:
You could still maintain some "virtual"
.env
file where secrets can be browsed by the user ,but the key point would be that at no point that information is actually saved in plaintext on the hard drive.The text was updated successfully, but these errors were encountered: