Skip to content

Replace plaintext token storage with secure credential storage #41

@hex2dec

Description

@hex2dec

Problem

auth login currently persists access tokens as plaintext in local configuration. This treats secrets like ordinary settings and does not meet modern CLI security expectations.

Root Cause Analysis

The authentication flow uses the same on-disk configuration path for both normal settings and persisted credentials. There is no dedicated credential storage abstraction and no secure OS-backed storage path, so secrets end up in a plaintext config file by design.

Fix Plan

  1. Replace plaintext token persistence with a dedicated secure credential storage approach.
  2. Keep normal CLI configuration separate from secret storage.
  3. Remove the current plaintext credential persistence path instead of maintaining backward compatibility.
  4. Preserve stable authenticated command behavior once credentials are stored through the new path.

Acceptance Criteria

  • Persisted tokens are no longer stored as plaintext in normal CLI settings by default.
  • The CLI uses a dedicated secure credential storage path for saved tokens.
  • Existing plaintext token persistence is removed instead of maintained.
  • auth status and other authenticated commands continue to work with the new storage flow.
  • All new tests pass.
  • Existing tests still pass.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions