-
Notifications
You must be signed in to change notification settings - Fork 45
Open
Description
Problem
During a security audit of our dependencies, we identified committed private keys in the repository:
- redis/tools/tls/ca.key
- redis/tools/tls/server.key
While we understand these are likely used for testing and tooling, committing secrets to version control triggers high-severity alerts in enterprise compliance scanners (e.g., TruffleHog, GitHub Secret Scanning) and violates modern security protocols.
Supporting Standards
- OWASP: Secrets Management Cheat Sheet explicitly states that secrets should never be stored in version control.
- NIST SP 800-57: Outlines strict requirements for the protection of private keys to maintain the integrity of a system's security posture.
Suggested Resolution
We recommend removing these static files from the repository and instead generating them dynamically during the test or build bootstrap phase.
This would resolve compliance flags for all downstream users and align the library with "Secure by Design" industry standards.
Thank you for your work on this library!
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels