"details": "### Summary\nWhen using Keycloak as an oidc provider, the clientsecret gets printed into the container stdout logs for an example at container startup.\n\n### Details\nContainer Image (15.04.2025): ghcr.io/project-zot/zot-linux-amd64:latest\nHere is an example how the configuration can look which causes the above stated problem:\n\n` http:\n address: \"0.0.0.0\"\n port: 5000\n externalUrl: \"https://zot.example.com\"\n auth: {\n failDelay: 1,\n openid: {\n providers: {\n oidc: {\n name: \"Keycloak\",\n clientid: \"zot-client-id\",\n clientsecret: fsdfkmmiwljasdklfsjaskldjfkljewijrf234i52k3j45l,\n keypath: \"\",\n issuer: \"https://keycloak.example.com/realms/example\",\n scopes: [\"openid\"]\n }\n }\n }\n }\n`\n\n### PoC\nSet up a blank new zot k8s deployment with the code snippet above.\n\n### Impact\nexposure of secrets, on configuring a oidc provider",
0 commit comments