Skip to content
This repository was archived by the owner on Oct 27, 2024. It is now read-only.

Storing the Checkov token in settings.json is insecure #129

@ryboe

Description

@ryboe

We currently have to pass the Checkov token by storing it in settings.json.

"checkov.token": "<REDACTED>"

This is not ideal for a few of reasons:

  1. It contributes to secret sprawl (settings.json file is one more file that needs to be protected)
  2. settings.json is globally readable on my Mac (644 permissions)
  3. The secret persists on the file system.
  4. The secret is readable in plaintext.
  5. If Settings Sync is enabled, the secret is copied to the cloud (in plaintext).

It would be better to have the option of pulling the secret from the BC_API_KEY env var. That would let us avoid storing the secret on the file system.

Thanks for making a great IaC scanner and thanks for considering this feature.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions