Skip to content

Update sensitive information placeholders in documentation and config…#13

Open
kirkryan wants to merge 1 commit intomainfrom
chore/follow-semgrep-password-guidance
Open

Update sensitive information placeholders in documentation and config…#13
kirkryan wants to merge 1 commit intomainfrom
chore/follow-semgrep-password-guidance

Conversation

@kirkryan
Copy link
Copy Markdown
Collaborator

This pull request standardizes the use of placeholder values for sensitive credentials and secrets across documentation and configuration files. Instead of using real or example passwords, API keys, and secrets, the documentation now consistently uses clearly marked placeholders (e.g., YOUR_PASSWORD_HERE, YOUR_CLIENT_ID_HERE). This change improves security practices and helps prevent accidental use of insecure example secrets in production environments.

The most important changes are:

Credential and Secret Placeholders in Documentation:

Configuration and Deployment Example Updates:

  • Updated all example configuration files (values.yaml, .env, README.md, and Kubernetes/Helm manifests) to use the new placeholders instead of insecure default values. [1] [2] [3] [4] [5] [6] [7] [8] [9]

These changes make it clear to users that they must provide their own secure values and help prevent accidental exposure of sensitive information.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant