Skip to content

Conversation

@srt0422
Copy link
Contributor

@srt0422 srt0422 commented Nov 28, 2023

No description provided.

`--log-level-proxy=${process.env.LOG_LEVEL_PROXY}`,
`--log-level-connection=${process.env.LOG_LEVEL_CONNECTION}`,

`--wallet-private-key=${config.privateKey}`,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The private key is being passed as a command line argument. This is a security risk because command line arguments can be viewed by any user on the system using commands like 'ps'. It's also possible that the command line arguments could be logged somewhere, exposing the private key.

Instead of passing sensitive data like private keys as command line arguments, consider using a more secure method. For example, you could read the private key from a file with appropriate permissions, or use environment variables if the environment is secure and isolated.

`--log-level-proxy=${process.env.LOG_LEVEL_PROXY}`,
`--log-level-connection=${process.env.LOG_LEVEL_CONNECTION}`,

`--wallet-private-key=${config.privateKey}`,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The private key is being passed as a command line argument. This is a security risk because command line arguments can be viewed by any user on the system using commands like 'ps'. It's also possible that the command line arguments could be logged somewhere, exposing the private key.

Instead of passing sensitive data like private keys as command line arguments, consider using a more secure method. For example, you could read the private key from a file that has strict permissions, or use environment variables if you ensure they are not logged or exposed in other ways.

`--log-level-connection=${process.env.LOG_LEVEL_CONNECTION}`,
`--log-folder-path=${app.getPath("logs")}/`,

`--wallet-private-key=${config.privateKey}`,

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The private key is being passed as a command line argument. This is a security risk because command line arguments can be viewed by any user on the system using commands like ps or by inspecting the /proc filesystem. It's also possible that the command line arguments could be logged by the system or by third-party monitoring tools, which would expose the private key.

Instead of passing sensitive data like private keys as command line arguments, consider using a more secure method. For example, you could read the private key from a file with appropriate permissions, or use an environment variable. If you use an environment variable, make sure it's not logged or exposed in other ways.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants