HI version is available. Content is displayed in original English for accuracy.
Advertisement
Advertisement
⚡ Community Insights
Discussion Sentiment
50% Positive
Analyzed from 396 words in the discussion.
Trending Topics
#cli#credentials#something#https#same#process#interesting#env#execve#injection

Discussion (14 Comments)Read Original on HackerNews
I find it super easy to just make a document, and enter key-val details as attributes.
No, sorry, I, nor anyone I know, would trust credentials to any organization with so little transparency and lack of guarantees, also considering audited alternatives.
Oh, and indeed, where is the key card? Is it in an ASCII art somewhere in documentation?
The design is nice, however, but... may I ask, how much non-AI work was done, if any?
https://mrorigo.github.io/envkey/
Is this something more (and something more interesting) than just standard spawned process inheriting the parent process environment?
IOW is this actually injecting in the true sense of the word? Because that'd be interesting.
I'm not being pedantic. I just want to read about injection when I'm promised injection :-) because that'd be technically interesting for me. Plainly calling execve isn't so much, I have the manpage here already :-)
reminds me of the 1password cli:
https://developer.1password.com/docs/cli/reference/commands/...