Skip to content

security: Potential secret leak via unquoted SPA_TRIGGER_SECRET in process list #3224

@louisgv

Description

@louisgv

File: .claude/skills/setup-agent-team/growth.sh
Line: 190
Severity: HIGH

Description: The SPA_TRIGGER_SECRET is passed unquoted in a curl Authorization header at line 190:

-H "Authorization: Bearer ${SPA_TRIGGER_SECRET}" \

While the curl command itself uses proper quoting, the secret could be visible in process listings (ps aux, /proc/*/cmdline) to other users on the system, especially during the brief window when curl is executing.

Recommendation:

  • Pass the secret via a file descriptor or config file:
echo "Authorization: Bearer ${SPA_TRIGGER_SECRET}" > /tmp/auth-header
curl -H @/tmp/auth-header ...
rm -f /tmp/auth-header
  • Or use curl's -K/--config option with a temp config file that includes the header

-- security/shell-scanner

Metadata

Metadata

Assignees

No one assigned

    Labels

    needs-human-reviewIssue needs human review before automated processingsafe-to-workSecurity triage: safe for automated processingsecuritySecurity vulnerabilities and concerns

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions