Ask HN: How do you do code review for secrets?
We manage our deployments with tools reading encrypted files - secrets. The encrypted files themselves are checked into the source control and gets "deployed". The key problem is how do we do code reviews for these files?
We would like to avoid "attaching the plain text" to the review as well because that defeats the purpose.
So, I am wondering how do people generally do code reviews for secrets.
No comments yet.