.secrets
# Install pre-commit pre-commit install If you must share a .secrets file via email or cloud storage, use GPG (GNU Privacy Guard) or age encryption. Do not use password-protected ZIP files (they are trivial to crack). Rule 5: The .secrets.template Pattern Instead of committing a real .secrets file, commit a .secrets.template file.
# .secrets - NEVER COMMIT THIS FILE DATABASE_URL=postgresql://admin:SuperStrongP@ssw0rd!@prod-db:5432/main DATABASE_REPLICA_PASSWORD=ReplicaKey_9x2#kLp API Keys (Third Party) STRIPE_LIVE_SECRET_KEY=sk_live_51H3kL9P4mVx9... (truncated) AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY Internal Service Tokens JWT_SIGNING_SECRET=8f3e9a1c7b2d4f6a9e1c7b3d5f8a2e4c HASHICORP_TOKEN=hvs.CAESIAlp... .secrets
# docker-compose.yml (Swarm mode) secrets: db_password: external: true services: app: secrets: - db_password Even if you use a vault, the .secrets file has three insidious ways of leaking data. 1. The Log File Your application code might have a debug statement: console.log(process.env) . If the .secrets file is loaded into environment variables, that log line dumps all your passwords to Datadog or Splunk. Always scrub your logs. 2. The Dump File When a Node.js or Python app crashes, it often creates a core dump or a heap snapshot. These memory dumps contain the exact string values of your .secrets file. If a crash report is sent to a third-party service (Sentry, Bugsnag), your secrets go with it. 3. The Backup You set up a nightly backup script for your home directory. It captures /home/user/projects/ . It captures the .secrets file. The backup goes to an unencrypted S3 bucket. The bucket gets misconfigured. You lose everything. Best Practices: How to Tame the .secrets Beast To use .secrets files safely, implement these five ironclad rules: Rule 1: Never Store Production Secrets on a Laptop Your local .secrets file should only contain development credentials (localhost database, mock API keys). Production secrets should require a VPN or a vault token to access. Rule 2: Rotate Secrets Aggressively If a .secrets file is ever exposed—even for a second—rotate every secret inside it. Your CI/CD should support automatic rotation. Manual rotation is boring; automatic rotation is secure. Rule 3: Use Pre-Commit Hooks Install a tool like detect-secrets (Yelp) or truffleHog . These run a scan every time you type git commit . If they detect a string that looks like an API key or a high-entropy password (like sk_live_... ), they block the commit. # Install pre-commit pre-commit install If you must share a
Treat it carelessly—commit it to GitHub, email it around, log it to the console—and you are handing the keys to your kingdom to every bot scanning the internet. Treat it professionally—use a vault, rotate keys, ignore it from Git—and it becomes an invisible shield protecting your users' data. easy to debug
A study by North Carolina State University analyzed 1.4 million GitHub repositories. They found hundreds of thousands of unique, valid API keys and cryptographic secrets. How did they get there? Developers committed the .secrets file by accident.
Where do you store the keys to your digital kingdom? The database password, the API token for your payment gateway, the private SSH key for production—you can’t hardcode them into your application (that’s a nightmare). You can’t store them in a spreadsheet (that’s chaos). So, the industry landed on a quiet, unassuming, yet incredibly powerful convention: the file.
# .secrets.template DATABASE_PASSWORD=<your-local-password> API_KEY=<get-from-vault> The developer copies .secrets.template to .secrets and fills in the blanks. The template contains no real secrets, so it is safe in Git. The .secrets file is a bridge technology. It is human-readable, easy to debug, and works everywhere. But the industry is moving toward ephemeral secrets and OIDC (OpenID Connect) .