You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A pull request could add the command echo $GITHUB_ACCESS_TOKEN and expose the token. Even if you are only using in private repositories, I don't think it is desirable to so directly expose a private token to collaborators.
Perhaps there's a way to still make the token available to entrypoint.sh without making it visible as an env var on the runner?
The text was updated successfully, but these errors were encountered:
I second this. I had to rotate my token today because of Codecov.io's recent security incident which potentially exposed this token.
Would it be sensible to bind a .env file containing the token into the container to get the token from there?
and avoid providing the secure credentials in an environmental variable at run time. Once the container is up, I docker exec into it, run entrypoint.sh manually with the credentials. This way, these credentials are not stored as env var that could be accidentally exposed.
I'm not a security expert, and there may be other routes which are more streamlined and/or more secure than this, but at least I think it's better than embedding the private token so directly.
A pull request could add the command
echo $GITHUB_ACCESS_TOKEN
and expose the token. Even if you are only using in private repositories, I don't think it is desirable to so directly expose a private token to collaborators.Perhaps there's a way to still make the token available to
entrypoint.sh
without making it visible as an env var on the runner?The text was updated successfully, but these errors were encountered: