| ▲ | elif 7 hours ago | ||||||||||||||||||||||||||||
It wasn't in their product. It was just on a devs machine | |||||||||||||||||||||||||||||
| ▲ | hnlmorg 7 hours ago | parent [-] | ||||||||||||||||||||||||||||
I think the OP is aware of that and I agree with them that it’s bad practice despite how common it is. For example with AWS, you can use the AWS CLI to sign you in and that goes through the HTTPS auth flow to provide you with temporary access keys. Which means: 1. You don’t have any access keys in plain text 2. Even if your env vars are also stolen, those AWS keys expire within a few hours anyway. If the cloud service you’re using doesn’t support OIDC or any other ephemeral access keys, then you should store them encrypted. There’s numerous ways you can do this, from password managers to just using PGP/GPG directly. Just make sure you aren’t pasting them into your shell otherwise you’ll then have those keys in plain text in your .history file. I will agree that It does take effort to get your cloud credentials set up in a convenient way (easy to access, but without those access keys in plain text). But if you’re doing cloud stuff professionally, like the devs in the article, then you really should learn how to use these tools. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||