Skip to content

Security: Committed private keys in redis/tools/tls trigger compliance failures #394

@segor

Description

@segor

Problem

During a security audit of our dependencies, we identified committed private keys in the repository:

  • redis/tools/tls/ca.key
  • redis/tools/tls/server.key

While we understand these are likely used for testing and tooling, committing secrets to version control triggers high-severity alerts in enterprise compliance scanners (e.g., TruffleHog, GitHub Secret Scanning) and violates modern security protocols.

Supporting Standards

  • OWASP: Secrets Management Cheat Sheet explicitly states that secrets should never be stored in version control.
  • NIST SP 800-57: Outlines strict requirements for the protection of private keys to maintain the integrity of a system's security posture.

Suggested Resolution

We recommend removing these static files from the repository and instead generating them dynamically during the test or build bootstrap phase.
This would resolve compliance flags for all downstream users and align the library with "Secure by Design" industry standards.

Thank you for your work on this library!

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions