Can the .env.vault file be cracked?
See original GitHub issueMaking a change to an existing variable value and executing a dotenv-vault push staging
successfully updated the value according to the dotenv webui, however, nothing changed in Heroku. Editing the value from the dotenv webui does update Heroku as a workaround.
Issue Analytics
- State:
- Created a year ago
- Comments:10 (6 by maintainers)
Top Results From Across the Web
Stop Using .env Files Now! - DEV Community
NO ONE gets hacked via their .env file. Ever. First of all, it's really easy to lock it down so no one can...
Read more >Is it secure to store passwords as environment variables ...
It depends on the operating system -- At best case, environment variables are as vulnerable as plaintext files, but likely are worse. With...
Read more >What security advantages does Hashicorp Vault have over ...
1 Answer 1 · Use Vault's GitHub authentication to authenticate your developers and operators. GitHub team membership is mapped to policy in Vault ......
Read more >HashiCorp Vault - Manage Secrets & Protect Sensitive Data
Secure, store, and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets.
Read more >Prod Vault Optimization & Vault for Tests - SymfonyCasts
I never get mad! The truth is, your sensitive values are never fully safe on production: there is always some way - called...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
This is a good point. We have a deep GitHub Integration coming mid-December (hopefully earlier!) that will make a large stride toward rectifying this.
I empathize with this statement because I share it too from an optics and behavioral point of view. It just feels weird to have it 'out there. But AES’s brute-force timescale is like a billion years. [1] The US Government uses it to transmit top-secret information. [2] By the time this becomes a real risk we will have solved 1-click batch key-rotation - the true final solution to keep your secrets safe. This is our end goal for the developer and security community.
Our other long-term goal is interoperability WITHOUT native 3rd party integrations. Those have significant security risks. [3]. We’re taking a big bet with this new approach. It looks non-standard right now, but we’re convinced it will become the de facto standard - this encrypted .env.vault file. It will work everywhere in an understandable and open way. Give us time on the flow issues. We will solve them.
[1] AES 256 is virtually impenetrable using brute-force methods. While a 56-bit DES key can be cracked in less than a day, AES would take billions of years to break using current computing technology. Hackers would be foolish to even attempt this type of attack. [2] AES-256 is currently labeled as sufficient to use in the US government for the transmission of TOP SECRET/SCI information [3] Heroku-GitHub Breach Highlights Integration Risks
Thank you @bradrf. We are taking a look. This must be a regression.