-
**Describe the bug**
detect-secrets tool does not detect secrets that are base64 encoded
**To Reproduce**
Steps to reproduce the behavior:
1. create a simple module
```python
def main():
…
-
## Description
Make "credentials" a ``OmegaConf`` resolver, so injecting credentials in the catalog would look like :
```yaml
# current injection
my_data:
type: pandas.CSVDataset
…
-
You should make the script to use / look up for the file in the current dir, without "hardcoding" anything (such as a required app folder)
Change Line 10 to
```
cat > ../${PWD##*/}/credentials.json
-
```yaml
{
"id": 734,
"title": "RVD#734: Multiple ABB Products CVE-2019-7225 Hardcoded Credentials Vulnerability",
"type": "vulnerability",
"description": "The ABB HMI components imple…
-
### Before reporting an issue
- [X] I have read and understood the above terms for submitting issues, and I understand that my issue may be closed without action if I do not follow them.
### Area
a…
-
At the moment it is difficult for customers to test multiple different accounts from the same provider in the same workspace because our sandboxes typically only support one set of fake credentials. W…
-
### Describe the bug
We configured our profile like so:
```
aws configure --profile base set credential_process cred-process.sh
aws configure --profile default set source_profile base
aws confi…
-
## Description
Static source code assessment has picked up a potential vulnerability regarding use of hardcoded password.
## The report from which the above information was summarized
Risk Rating…
-
So, my use case is basically to avoid exposing a secret (postgres password) anywhere in repository or nix store. To do so, I'm leveraging sops-nix files with secrets. Here is the part of my config:
…
ajgon updated
1 month ago
-
:bulb: **Idea**
Currently the service URL is configurable but the FCM credentials are hardcoded, so changing them requires building and deploying a new build. I guess the reason is that [it's done th…