When you fire off a trigger it responds with data packet with everything about the container service. Given that triggers require no authentication (secured by obfuscation only) this is bad news
The calculated_envvars
is the main culprit, revealing all environment variables for the service. If you need to provide any secrets in your stack configuration it makes triggers especially vulnerable.
"calculated_envvars": [
{
"key": "COOKIE",
"origin": "user",
"value": "SRV insert indirect nocache"
},
{
"key": "EXCLUDE_PORTS",
"origin": "user",
"value": "8080"
},
{
"key": "FARCRY_DBTYPE",
"origin": "user",
"value": "mysql"
},
{
"key": "FARCRY_DSN",
"origin": "user",
"value": "foobar"
},
{
"key": "FARCRY_DSN_CLASS",
"origin": "user",
"value": "org.gjt.mm.mysql.Driver"
},
{
"key": "FARCRY_DSN_CONNECTIONSTRING",
"origin": "user",
"value": "jdbc:mysql://mytopsecret.database.location.com:3306/foo_stage?useUnicode=true&characterEncoding=UTF-8&allowMultiQueries=true&useLegacyDatetimeCode=true"
},
{
"key": "FARCRY_DSN_PASSWORD",
"origin": "user",
"value": "encrypted:topsecretsquirrelpasswordxxxx"
},
...snip8<...snip8<...snip8<...snip8<
It would be ideal if triggers suppressed everything by default beyond a success message confirming the service identity. Perhaps for those more trusting souls, triggers could have an option on the trigger ui to optionally expose data.
What do you think?