← Back to context

Comment by mr_toad

2 months ago

One option is pass, which is a shell script that uses GPG to manage passwords for command line tools. You can put the password store into a git repository if you need to sync it across machines.

Wait, what? "put the password store into a git repository"?!

  • The store in the case of pass, is a plain text file, whose contents are encrypted strings. If you trust the encryption, you can put it anywhere you like. Keep the keys secret and safe, though!

    • Until you have to fire one of your disgruntled employees, who has a copy of all your secrets that you now need to rotate.

      A repository that an attacker only needs to get access to once, after which they can perform offline attacks against at their leisure.

      A repository that contains the history of changed values, possibly making the latter easier, if you used the same encryption secret for rotated values.

      This is an awful idea. Use a proper secret management tool you need to authenticate to using OIDC or Passkeys, and load secrets at runtime within the process. Everything else is dangerous.