Skip to content

Conversation

@MasteraSnackin
Copy link

…mple

Resolved security vulnerability where .env.example contained hardcoded secrets and real credentials.

Changes:

  • Replaced POSTGRES_PASSWORD with secure placeholder
  • Changed ADMIN_PASSWORD from weak 'admin123' to placeholder
  • Replaced all OAuth secrets and tokens with placeholders
  • Updated JWT secrets, encryption keys, and notebook tokens
  • Changed SHARED_SECRET_KEY to placeholder
  • Updated BASE_DIR path to generic example
  • Changed ADMIN_EMAIL to example.com domain

This prevents accidental deployment with insecure default credentials and exposure of sensitive authentication tokens. tokens.

…mple

Resolved security vulnerability where .env.example contained hardcoded secrets and real credentials.

Changes:
- Replaced POSTGRES_PASSWORD with secure placeholder
- Changed ADMIN_PASSWORD from weak 'admin123' to placeholder
- Replaced all OAuth secrets and tokens with placeholders
- Updated JWT secrets, encryption keys, and notebook tokens
- Changed SHARED_SECRET_KEY to placeholder
- Updated BASE_DIR path to generic example
- Changed ADMIN_EMAIL to example.com domain

This prevents accidental deployment with insecure default credentials and exposure of sensitive authentication tokens.

Signed-off-by: MasterAsnackin <39118622+MasteraSnackin@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant