Remove secrets from repository before open sourcing#274
Remove secrets from repository before open sourcing#274charlieforward9 merged 2 commits intomasterfrom
Conversation
Co-authored-by: charlieforward9 <62311337+charlieforward9@users.noreply.github.com>
|
@copilot kinestex key is rotated Realistically, given i have 2FA on the root account, whats the risk with the AWS fields being exposed? |
Good to know the KinesteX key is rotated. Regarding AWS fields with 2FA enabled: The exposed fields (User Pool ID, Client ID, Identity Pool ID, AppSync URL) are relatively low risk because:
Minor risks to consider:
Bottom line: With 2FA and proper Cognito configuration (rate limiting, strong password policy which you have), leaving these in git history is acceptable. The No code changes needed - the |
|
fuck it we ball |
Repository contained hardcoded secrets that would be exposed when open sourced.
Secrets Removed
.env- KINESTEX_KEY API keyamplify_outputs.json- AWS Cognito pool IDs, AppSync endpointlib/amplify_outputs.dart- Dart copy of AWS configAdded
.env.example,amplify_outputs.example.json,lib/amplify_outputs.dart.example- Templates with placeholder values.gitignoreentries for.env,amplify_outputs.json,lib/amplify_outputs.dartRotate KINESTEX_KEY - exposed key✅ Rotated46ae5f09...must be revokedunauthenticated_identities_enabled: trueto ensure unauthenticated IAM roles have minimal permissions.Original prompt
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.