Caution
Previous secrets (NEXTAUTH_SECRET, ADMIN_API_KEY, SMTP_PASS) were committed to the repository history. They are COMPROMISED. The values below are redacted placeholders. You MUST generate fresh ones and store them only in your deployment platform's environment variables.
Generated: <REDACTED_AND_ROTATED>
Command: node -e "console.log(require('crypto').randomBytes(48).toString('base64'))"
Usage: JWT token signing, session encryption
Generated: <REDACTED_AND_ROTATED>
Command: node -e "console.log(require('crypto').randomBytes(32).toString('hex'))"
Usage: Administrative API authentication
Obtained: <REDACTED_SMTP_PASSWORD>
Source: Google App Passwords (https://myaccount.google.com/apppasswords)
Account: ebic@cit.edu.ly
Date: User-provided 2026-02-05
Command: openssl rand -hex 32
Usage: Email verification tokens
- SMTP password obtained from Google App Passwords
- Replace all development secrets in production
- Never commit production secrets to repository
- Store secrets securely (Virtuozzo environment variables)
- Rotate secrets if exposed
- Use different secrets for dev/staging/production
- Copy
.env.production.templateto.env.production - Replace all
[PLACEHOLDER]values - Add
.env.productionto.gitignore - Configure secrets in Virtuozzo Dashboard (Environment Variables)
- Never push
.env.productionto git