| ▲ | btown 4 hours ago | ||||||||||||||||||||||
Via the incident page: > Environment variables marked as "sensitive" in Vercel are stored in a manner that prevents them from being read, and we currently do not have evidence that those values were accessed. However, if any of your environment variables contain secrets (API keys, tokens, database credentials, signing keys) that were not marked as sensitive, those values should be treated as potentially exposed and rotated as a priority. https://vercel.com/kb/bulletin/vercel-april-2026-security-in... as of 4:22p ET | |||||||||||||||||||||||
| ▲ | aziaziazi 3 hours ago | parent | next [-] | ||||||||||||||||||||||
The “sensitive” toggle is off by default. I’m curious about the rationale, what's the benefit of this default for users and/or Vercel? https://vercel.com/docs/environment-variables/sensitive-envi... | |||||||||||||||||||||||
| |||||||||||||||||||||||
| ▲ | jtchang an hour ago | parent | prev [-] | ||||||||||||||||||||||
How does the app read the variable if it can't be read after you input it? Or do they mean you can't view it after providing the variable value to the UI? | |||||||||||||||||||||||