|
1 | 1 | *Why you should check documentation for secrets*
|
2 | 2 |
|
3 |
| -Documentation and specification files are often shared widely and may be overlooked during security reviews. Sometimes, secrets or sensitive information are added as examples or instructions and are not removed before sharing or publishing. This challenge highlights the importance of reviewing all project files—including documentation—for secrets and sensitive data. |
| 3 | +Documentation and specification files are often shared widely and may be overlooked during security reviews. |
| 4 | +Sometimes, secrets or sensitive information are added as examples or instructions and are not removed before sharing or publishing. |
| 5 | +This challenge highlights the importance of reviewing all project files—including documentation—for secrets and sensitive data. |
| 6 | + |
| 7 | +---- |
| 8 | +
|
| 9 | +In a real project, you should always include explicit security requirements in your project specification or agentic plan. This means: |
| 10 | +- Listing how secrets should be managed, stored, and rotated. |
| 11 | +- Defining who has access to sensitive files and how access is controlled. |
| 12 | +- Stating which tools or processes must be used to scan for secrets in all files, including documentation. |
| 13 | +- Requiring regular reviews of both code and documentation for accidental secret leakage. |
| 14 | +
|
| 15 | +Adding these requirements helps ensure that security is considered from the start and reduces the risk of sensitive data exposure through overlooked files or bad practices. |
| 16 | +
|
| 17 | +[NOTE] |
| 18 | +==== |
| 19 | +In real projects, always include security instructions on: |
| 20 | +- TLS/SSL usage for all network communications |
| 21 | +- Encryption of sensitive data at rest and in transit |
| 22 | +- Input validation and sanitization to prevent injection attacks |
| 23 | +- Secure authentication and authorization mechanisms |
| 24 | +- Regular dependency and vulnerability scanning |
| 25 | +- Logging and monitoring for suspicious activity |
| 26 | +- Using the right model and language for the right problem |
| 27 | +
|
| 28 | +These practices are essential for protecting your application and its data. |
| 29 | +==== |
0 commit comments