-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Yorkie API key is been leaking #435
Comments
Thank you for creating the issue! The key in question is a public API key used on the frontend, so it should remain there. In contrast, our secret key for Yorkie is securely stored on the backend. |
Thank you for responding @devleejb I misunderstood something. But we are still on the problem. Let's think about this case. According to yorkie documents, I can make a yorkie client only with public key. With these information, open up the vscode, write a few line of code... voilà! I just screwed up your document! I know you can think I am going too much. |
Yes, that’s correct. Actually, this is a known issue. One way to address it is by enabling the Authentication Webhook. However, for various reasons, we haven’t enabled it yet. I believe now is the right time to consider enabling it. Thank you for bringing this up! I’ll discuss it with the other maintainers. FYI, CodePair already supports authentication webhook endpoint: |
What happened: Yorkie API key is been leaking in browser
What you expected to happen: Of course it shouldn't be..
How to reproduce it (as minimally and precisely as possible):
In browser development tool > source tab. you can find api key easily
Anything else we need to know?:
Environment:
The text was updated successfully, but these errors were encountered: