Analyzing impact of leaked client_secret in Authorization Code Flow in Keycloak (CVE-2020-27838)

CVE-2020-27838 describes that Keycloak has an open endpoint where it’s possible to obtain client_secret information, as shown in the example below:
/auth/realms/{realm}/clients-registrations/default/{client_id}

Through other discussions, … Continue reading Analyzing impact of leaked client_secret in Authorization Code Flow in Keycloak (CVE-2020-27838)

Is it risky to include .env files in the .zip which is uploaded to Elastic Beanstalk for deployment? If so, what is the risk?

Is it okay to upload .env files containing client ID and client secret to elastic beanstalk? If not, what is the risk involved? How would one access those files?

Continue reading Is it risky to include .env files in the .zip which is uploaded to Elastic Beanstalk for deployment? If so, what is the risk?

Why don’t basically all "clusters" and similar distributed systems use Shamir’s secret sharing method? [migrated]

When I came to the topic of Ansible (Vault), when deploying secrets in Ansible and other passwords up to 128 characters Shamir’s Secret Sharing would be an ideal solution I think:

The secret is never in one spot
The secret can be encrypte… Continue reading Why don’t basically all "clusters" and similar distributed systems use Shamir’s secret sharing method? [migrated]

How to securely pass secrets if I’m deploying my app n the old school way, rather than using Docker, Heroku, cloud etc?

Is it unsafe to use environmental variables for secret data?
^^ according to that question and answers:

Environment variables are a poor (though perhaps passable, as per Forest’s comment) way to store secrets;
The preferred way is to use … Continue reading How to securely pass secrets if I’m deploying my app n the old school way, rather than using Docker, Heroku, cloud etc?