Need this addressed.
this is really dangerous since every pipeline as long user have access the could executed a pipeline inside our own branch
https://cloud.google.com/blog/topics/threat-intelligence/bitbucket-pipeline-leaking-secrets
could we somehow disable artifacts if there is some command running or like blocked printenv completely
Hey @Prima Adi Pradana - isn't this the case for all cloud CI/CD tools - not just Pipelines? It looks like the exact same thing happens with Github Actions: https://github.com/orgs/community/discussions/24928
If you're concerned about this happening, you could use something like a Dynamic Pipeline to look through any CI workflows before they run and not run any that look to be printing secrets to files.
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.