Remove hardcoded Supabase service-role JWT from committed script #3
Labels
No Milestone
No project
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: cal/paper-dynasty-card-creation#3
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
scripts/supabase_doodling.py:5contains a full Supabase service_role JWT and API key directly in source. Service-role keys bypass row-level security and grant full database access.Priority: high | Labels: security
PR #42 opened: #42
Replaced the hardcoded service_role JWT with
os.environ["SUPABASE_SERVICE_ROLE_KEY"]. Both theAuthorizationandapikeyheaders now read from the env var. The script will raiseKeyErrorat startup if the env var is not set.Action needed: rotate the Supabase service_role key in the Supabase dashboard — the token that was committed is still active (expiry 2061) and should be considered compromised.