This repository was archived by the owner on May 5, 2020. It is now read-only.
This repository was archived by the owner on May 5, 2020. It is now read-only.
Leaking database credentials #79
Closed
Description
Hi, I have an issue with this package leaking database credentials. There's this line:
Line 535 in ea928ad
which seems like a really, really bad idea. Once you put the password into the package it should be impossible to get it back out (within reason, it should at least be explicitly intentional). It's pretty common in go do do something like
if nil != err {
log.Error(err)
}
which has consequences in this package. Could we replace that with something like this instead?
User: url.UserPassword(P.Username, "******"),
Metadata
Metadata
Assignees
Labels
No labels