Comment by theozero

14 hours ago

You might like varlock - it helps keep secrets out of plaintext by using plugins to pull from various backends (aws ssm, gcp, vault, 1pass, etc). Also has built in local encryption with shared team vaults coming soon.

Additionally provides pre commit scanning, log redaction, and much more.

But then you need creds to access AWS SSM, Vault, etc., and those end up getting stored the same way the actual creds you needed were being stored, and you're back at square one.

  • Nah you can get machine creds automatically via the metadata service when running inside AWS. Nothing need be on disk.

    • That's still not any better.

      If the LLM can run any code it writes itself, it can retrieve those credentials. It's just one `curl` away. If you don't let it run `curl`, but you let it run `python`, it can just run a Python script that fetches it using `requests`. Or a Node script that calls `fetch`.

      Point is, if creds are accessible programmatically, the LLM can and may try to retrieve them if it thinks it needs them.

      2 replies →