Skip to content

Security concern: provider admin APIs expose plaintext credentials #65

@iBreaker

Description

@iBreaker

Problem

The provider admin APIs currently return provider credentials in plaintext.

Observed responses from provider endpoints include raw sensitive values such as:

  • api_key
  • access_token
  • refresh_token

This means upstream provider credentials are being returned as ordinary API response fields through the admin surface.

Observations

  • GET /api/v1/providers returns plaintext credential fields
  • GET /api/v1/providers/:id returns plaintext credential fields
  • API-key-based providers return raw api_key
  • OAuth-based providers return raw access_token and refresh_token

Why this is concerning

Provider credentials are highly sensitive and should not be exposed as ordinary admin API response data.

Returning these values directly increases the chance of accidental disclosure through:

  • WebUI rendering
  • browser developer tools / network inspection
  • logs and debugging output
  • config export/import flows
  • any other consumer of the admin APIs

Question

Should provider admin APIs return raw credential values at all?

At minimum, this behavior appears to warrant a dedicated security review.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions