Skip to content

Conversation

@AnthonyDadeWT
Copy link
Contributor

I raised this issue and the discord and got feedback from @mateuszwojtczak

My project runs security scans on our Flutter app binaries and we had a critical violation due to the file:

ios/.symlinks/patrol/example/ios/Runner/GoogleService-Info.plist

The security scan detected sensitive information (in this case it thought it was a credit card #) in this file, and is probably related to the API key or GCM_SENDER_ID values.

GoogleService-Info.plist is a Firebase configuration file that contains secrets/API keys. This file is usually not version controlled to keep these values private. Due to this, I don't think this file belongs here, and having this present could also cause the same security violation for others using Patrol that also scan their app(s).

Read more in the discord thread where I brought this up:

https://discord.com/channels/1167030497612922931/1270048825569972394

@docs-page
Copy link

docs-page bot commented Aug 6, 2024

To view this pull requests documentation preview, visit the following URL:

patrol.leancode.co/~2295

Documentation is deployed and generated using docs.page.

@github-actions github-actions bot added the package: patrol Related to the patrol package (native automation, test bundling) label Aug 6, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

package: patrol Related to the patrol package (native automation, test bundling)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants