You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What is the Bug Related To? Please Provide a Description.
Having password stored in plaintext is not a good idea, especially if it is in a file tracked by Git.
default_config.yaml can expose a user's password if this file is absent from .gitignore and cloned repo is uploaded to a public Git repository. If downstream users (or even TOSTADAS devs) misconfigure the .gitignore and are sharing their cloned/forked version of TOSTADAS with other team members for development, then password can be accidentally leaked.
Place an ❌ in a Box that Best Matches the Bug's Importance:
[] 1 - Most severe (a full-break in core function)
[] 2-4 - Moderate (break for a particular aspect/feature) (how integral is the broken feature?)
5 - Least severe (non-functional issue, such as inconsistency / error in documentation or administrative in nature)
Not severe in affecting functionality but is a big security issue that should be addressed, especially if this is used in production workloads.
Please Complete the Following Information:
OS: [e.g. iOS]: N/A
Browser [e.g. chrome, safari]: N/A
Version [e.g. 22]: N/A
Run environment (container, cloud service, HPC, platform, etc.): N/A
Please Outline Necessary Steps to Replicate Bug (Go to.. Click on... Install the following... etc.): N/A
Any Additional Context or Information? Has There Been Any Progress Made So Far Towards this Request? Any Concrete Instructions to Resolve the Bug or Helpful Resources to Reference? Screenshots or Logs?
Possible solutions:
Move user credentials outside of repo's config file to an environmental variable (in a .env file). Update code to read from said location.
What is the Bug Related To? Please Provide a Description.
Having password stored in plaintext is not a good idea, especially if it is in a file tracked by Git.
default_config.yaml can expose a user's password if this file is absent from .gitignore and cloned repo is uploaded to a public Git repository. If downstream users (or even TOSTADAS devs) misconfigure the .gitignore and are sharing their cloned/forked version of TOSTADAS with other team members for development, then password can be accidentally leaked.
For generic details of this type of vulnerability see https://cwe.mitre.org/data/definitions/798.html (Example 4 shows plaintext password in config file)
Place an ❌ in a Box that Best Matches the Bug's Importance:
Not severe in affecting functionality but is a big security issue that should be addressed, especially if this is used in production workloads.
Please Complete the Following Information:
Please Outline Necessary Steps to Replicate Bug (Go to.. Click on... Install the following... etc.): N/A
Any Additional Context or Information? Has There Been Any Progress Made So Far Towards this Request? Any Concrete Instructions to Resolve the Bug or Helpful Resources to Reference? Screenshots or Logs?
Possible solutions:
In Case for Additional Follow-Up, Please Provide your Email: [email protected]
The text was updated successfully, but these errors were encountered: