-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DiIpreet | Test | White label Task #14302
base: giddh-2.0
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -41,8 +41,10 @@ export class HomeComponent implements OnInit, OnDestroy { | |
} | ||
|
||
public ngOnInit() { | ||
console.log(ApiUrl, GOOGLE_CLIENT_ID); | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🛠️ Refactor suggestion Avoid logging sensitive information to the console The Consider removing this console log or ensuring it's only used in a development environment. Apply this diff: - console.log(ApiUrl, GOOGLE_CLIENT_ID); |
||
|
||
this.companyUniqueName = this.generalService.companyUniqueName; | ||
|
||
this.needsToRedirectToLedger$.pipe(take(1)).subscribe(result => { | ||
if (result) { | ||
this.accountService.getFlattenAccounts('', '').pipe(takeUntil(this.destroyed$)).subscribe(data => { | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Critical security issue: Hard-coded sensitive credentials
The
tempConfig
object contains hard-coded sensitive information such asgoogleClientId
,googleClientSecret
,otpWidgetId
, andotpWidgetToken
. Including API keys and secrets directly in the codebase is a significant security risk, as it can lead to unauthorized access if the source code is exposed.I strongly recommend removing these hard-coded credentials from the code. Instead, store them securely using environment variables or a secrets management service, and retrieve them at runtime.
🧰 Tools
🪛 Gitleaks (8.21.2)
81-81: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.
(generic-api-key)
83-83: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.
(generic-api-key)