- Issue created by @mxr576
The recipe currently uses the Config key storage by default, which stores API credentials directly in the database. While this is a viable solution for proof-of-concepts and development environments, it poses security risks for production deployments where credentials should not be stored in the active configuration that gets exported and versioned.
Production environments require more secure credential storage methods to prevent sensitive information from being inadvertently exposed through configuration exports, version control, or database backups.
Potential future enhancement: Add a recipe input parameter to switch between "config" and "env" storage providers, where the environment variable option would require setting an environment variable before or after the recipe is applied.
Active
1.1
Code