Skip to content

fix: CodeQL alert -- clear-text storage of sensitive information in plugin_parser.py #1001

@sergio-sisternes-epam

Description

@sergio-sisternes-epam

Context

Surfaced by CodeQL during #999 (code quality guardrails PR). The alert is pre-existing -- not introduced by #999 (which only reformatted the file).

Alert

CodeQL flags an expression that stores sensitive data (a secret/token) as clear text.

Action needed

  1. Review the flagged line to determine if the sensitive data handling is intentional (e.g., passing a token to a subprocess) or if it should be masked/redacted
  2. If intentional, suppress with an inline comment explaining why
  3. If a genuine issue, refactor to avoid storing the credential in a plain variable longer than necessary

References

Metadata

Metadata

Labels

area/content-securityUnicode scanning, Glassworm, apm audit content checks, SARIF output.bugDeprecated: use type/bug. Kept for issue history; will be removed in milestone 0.10.0.priority/highShips in current or next milestonestatus/acceptedDirection approved, safe to start work.status/triagedInitial agentic triage complete; pending maintainer ratification (silence = approval).theme/securitySecure by default. Content scanning, lockfile integrity, MCP trust boundaries.type/bugSomething does not work as documented.

Type

No type

Projects

Status

Done

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions