-
Notifications
You must be signed in to change notification settings - Fork 254
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exposes sensitive variables in logs #75
Comments
😱 do you have an example or can you point us to the line where this is logged/printed? |
I'll try replicate again tomorrow - was a message about the key not being recognized as a GitHub deployment key. I wanted to purge that log asap when it came through 🤣 |
Sure it was a private key? A public key fingerprint would make more sense to me. |
@peter-dolkens this action passes the sensitive, private keys directly into I'll close this for now, but feel free to reopen if you still suspect something being wrong here. |
I can't use this for our company, as it dumps potentially sensitive private keys straight to the logs.
Unfortunately, it not only exposes them, but also reformats them, meaning the inbuilt github secret masking doesn't catch it.
The text was updated successfully, but these errors were encountered: