-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
Problem
auth login currently persists access tokens as plaintext in local configuration. This treats secrets like ordinary settings and does not meet modern CLI security expectations.
Root Cause Analysis
The authentication flow uses the same on-disk configuration path for both normal settings and persisted credentials. There is no dedicated credential storage abstraction and no secure OS-backed storage path, so secrets end up in a plaintext config file by design.
Fix Plan
- Replace plaintext token persistence with a dedicated secure credential storage approach.
- Keep normal CLI configuration separate from secret storage.
- Remove the current plaintext credential persistence path instead of maintaining backward compatibility.
- Preserve stable authenticated command behavior once credentials are stored through the new path.
Acceptance Criteria
- Persisted tokens are no longer stored as plaintext in normal CLI settings by default.
- The CLI uses a dedicated secure credential storage path for saved tokens.
- Existing plaintext token persistence is removed instead of maintained.
-
auth statusand other authenticated commands continue to work with the new storage flow. - All new tests pass.
- Existing tests still pass.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels