We currently have to pass the Checkov token by storing it in settings.json.
"checkov.token": "<REDACTED>"
This is not ideal for a few of reasons:
- It contributes to secret sprawl (
settings.json file is one more file that needs to be protected)
settings.json is globally readable on my Mac (644 permissions)
- The secret persists on the file system.
- The secret is readable in plaintext.
- If Settings Sync is enabled, the secret is copied to the cloud (in plaintext).
It would be better to have the option of pulling the secret from the BC_API_KEY env var. That would let us avoid storing the secret on the file system.
Thanks for making a great IaC scanner and thanks for considering this feature.