Skip to content

Keyless mode embeds secret keys in HTTP responses - fundamental security violation #6849

@nickls

Description

@nickls

Preliminary Checks

Reproduction

xxx

Publishable key

pk_test_Y3V0ZS1zd2luZS0yOS5jbGVyay5hY2NvdW50cy5kZXYk

Description

Clerk's keyless mode puts secret keys in client HTTP responses via React props serialization.

Even if these are "anonymous" keys, any code path that puts "secretKey":"sk_test_..." in browser responses is a fundamental security violation.

I understand the "developer experience vs security" tension, but this pattern seems destined to become tomorrow's zero-day exploit when someone finds a way to escalate anonymous keys or trigger real key exposure through the same code path.

Environment

Node

Metadata

Metadata

Assignees

No one assigned

    Labels

    needs-triageA ticket that needs to be triaged by a team member

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions