SiteShadow
Back to vulnerability library

CREDS01 Hard-coded Credentials in Config Files

What this means

SiteShadow found a credential stored directly in a config-like location (examples: .env, config.py, settings.yml, CI variables committed to repo, or "defaults" files).

Why it matters

Safer examples

1) Use environment variables (and keep .env out of git)

# .env (local only — DO NOT COMMIT)
DATABASE_URL=postgres://...
import os

DATABASE_URL = os.environ["DATABASE_URL"]

2) Use a secret manager for production

3) Separate config from secrets

Keep safe defaults in source, inject secrets at deploy time:

# config.yml (safe to commit)
service:
  logLevel: info

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage