question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Can the .env.vault file be cracked?

See original GitHub issue

Making a change to an existing variable value and executing a dotenv-vault push staging successfully updated the value according to the dotenv webui, however, nothing changed in Heroku. Editing the value from the dotenv webui does update Heroku as a workaround.

Issue Analytics

  • State:closed
  • Created a year ago
  • Comments:10 (6 by maintainers)

github_iconTop GitHub Comments

2reactions
motdotlacommented, Nov 22, 2022

I personally feel like the overall dotenv-vault experience feels a bit weird to me, as I have maintained both the webui and local vault.

This is a good point. We have a deep GitHub Integration coming mid-December (hopefully earlier!) that will make a large stride toward rectifying this.

I wouldn’t be willing to have our secrets sitting in a file where someone can effectively spend any amount of time and energy on various cracking methods against the encrypted contents

I empathize with this statement because I share it too from an optics and behavioral point of view. It just feels weird to have it 'out there. But AES’s brute-force timescale is like a billion years. [1] The US Government uses it to transmit top-secret information. [2] By the time this becomes a real risk we will have solved 1-click batch key-rotation - the true final solution to keep your secrets safe. This is our end goal for the developer and security community.

Our other long-term goal is interoperability WITHOUT native 3rd party integrations. Those have significant security risks. [3]. We’re taking a big bet with this new approach. It looks non-standard right now, but we’re convinced it will become the de facto standard - this encrypted .env.vault file. It will work everywhere in an understandable and open way. Give us time on the flow issues. We will solve them.

[1] AES 256 is virtually impenetrable using brute-force methods. While a 56-bit DES key can be cracked in less than a day, AES would take billions of years to break using current computing technology. Hackers would be foolish to even attempt this type of attack. [2] AES-256 is currently labeled as sufficient to use in the US government for the transmission of TOP SECRET/SCI information [3] Heroku-GitHub Breach Highlights Integration Risks

1reaction
motdotlacommented, Oct 7, 2022

Thank you @bradrf. We are taking a look. This must be a regression.

Read more comments on GitHub >

github_iconTop Results From Across the Web

Stop Using .env Files Now! - DEV Community ‍ ‍
NO ONE gets hacked via their .env file. Ever. First of all, it's really easy to lock it down so no one can...
Read more >
Is it secure to store passwords as environment variables ...
It depends on the operating system -- At best case, environment variables are as vulnerable as plaintext files, but likely are worse. With...
Read more >
What security advantages does Hashicorp Vault have over ...
1 Answer 1 · Use Vault's GitHub authentication to authenticate your developers and operators. GitHub team membership is mapped to policy in Vault ......
Read more >
HashiCorp Vault - Manage Secrets & Protect Sensitive Data
Secure, store, and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets.
Read more >
Prod Vault Optimization & Vault for Tests - SymfonyCasts
I never get mad! The truth is, your sensitive values are never fully safe on production: there is always some way - called...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found