Skip to content

Credentials exposed in environment variables and command-line arguments #2011

Closed
@dholbach

Description

@dholbach

Brought up by Ada Logics

Flux-CLI uses credentials to bootstrap many commands. These are often placed in the
command line or environment variables. This means the credentials are exposed to a wider
audience than intended, namely any internal attacker with a host position if they have
sufficient position to see command line arguments (such as via ps).
For example, if someone has access to the host at which the command line was entered but
not the access to the token of a given Github, then the details can be leaked.

Make it possible to write sensitive data in way that it won't be exposed, such as: ***** or not
showing any characters when being typed.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions