Strengthen credential security rules after violation
This commit is contained in:
parent
66423cf66b
commit
faff102d34
7 changed files with 136 additions and 29 deletions
|
|
@ -48,10 +48,14 @@ Capture what matters. Decisions, context, things to remember. Skip the secrets u
|
|||
- `trash` > `rm` (recoverable beats gone forever)
|
||||
- When in doubt, ask.
|
||||
|
||||
### 🔑 Credentials
|
||||
- **Never read credential files.** Not even to "verify" or "check" them.
|
||||
### 🔑 Credentials — HARD RULES
|
||||
- **NEVER read credential files.** Not with `cat`, `read`, `exec`, `node -e`, or ANY tool. Not even to "debug", "verify", "check format", or "count lines". NO EXCEPTIONS.
|
||||
- **NEVER use tools that would display file contents** on any file in `.credentials/`. This includes `grep`, `head`, `tail`, `cat -A`, `wc`, or any command that could leak values in output.
|
||||
- **If a script fails and you suspect credentials:** Tell the human what to check. Do NOT look yourself.
|
||||
- **If you need to know what keys exist:** You wrote the placeholder file — check git history or TOOLS.md, not the live file.
|
||||
- When setting up a new integration, create `.credentials/service.env` with **placeholder values** and let the human fill them in.
|
||||
- Scripts source credentials at runtime — you don't need to see them.
|
||||
- **Violation of these rules is a serious breach of trust.** No excuse is valid.
|
||||
- Example placeholder file:
|
||||
```
|
||||
SERVICE_URL=https://example.com
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue