Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use secrecy crate to protect PINs from accidental leaks #63

Merged
merged 1 commit into from
May 20, 2024

Conversation

wiktor-k
Copy link
Owner

Printing messages with the debug output appends secret data such as PINs to logs.

I think using secrecy is an easy way to make it a bit more explicit which data is sensitive and which isn't.

Happy to hear your suggestions!

@wiktor-k wiktor-k force-pushed the wiktor/use-secrecy branch from ce32e1c to 4756c67 Compare May 20, 2024 08:53
@wiktor-k wiktor-k marked this pull request as ready for review May 20, 2024 09:04
@wiktor-k
Copy link
Owner Author

Just for the record I think this already improves the status-quo but we could go further and wrap all KeypairDatas in secrets. This is not possible currently because of this issue though.

@wiktor-k
Copy link
Owner Author

Okay, based on the comment by the linked issue private key material is already secret-protected so the PIN is the only thing missing. I'm going to merge this PR and if something else pops-up we can tackle that in a follow-up PR.

@wiktor-k wiktor-k merged commit 082fa3b into main May 20, 2024
16 checks passed
@wiktor-k wiktor-k deleted the wiktor/use-secrecy branch May 20, 2024 15:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants