You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Check calls to os.getenv or os.environ to read sensitive data such as passwords or other secrets from environment variables
Describe the solution you'd like
As described in the CLI standard:
Do not read secrets from environment variables. While environment variables may be convenient for storing secrets, they have proven too prone to leakage:
Exported environment variables are sent to every process, and from there can easily leak into logs or be exfiltrated
Shell substitutions like curl -H "Authorization: Bearer $BEARER_TOKEN" will leak into globally-readable process state. (cURL offers the -H @filename alternative for reading sensitive headers from a file.)
Docker container environment variables can be viewed by anyone with Docker daemon access via docker inspect
Environment variables in systemd units are globally readable via systemctl show
Secrets should only be accepted via credential files, pipes, AF_UNIX sockets, secret management services, or another IPC mechanism.
Is your feature request related to a problem? Please describe.
Check calls to os.getenv or os.environ to read sensitive data such as passwords or other secrets from environment variables
Describe the solution you'd like
As described in the CLI standard:
For example:
https://github.com/openai/openai-python?tab=readme-ov-file#async-usage
Describe alternatives you've considered
n/a
Additional context
Love this idea? Give it a 👍. We prioritize fulfilling features with the most 👍.
The text was updated successfully, but these errors were encountered: