You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-4
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,9 @@ Git on linux has basically 3 options to store credentials.
11
11
-[git-credential-store](https://git-scm.com/docs/gitcredentials): stores credentials unencrypted on a filesystem, so anybody with access to the file can read them.
12
12
- libsecret based implementations (like this [one](https://github.com/shugo/git-credential-gnomekeyring)): These store credentials encrypted, but bring a full secret management solution and require workarounds without a graphical session ([see here](https://superuser.com/questions/141036/use-of-gnome-keyring-daemon-without-x)).
13
13
14
-
With GitHub's move to personal access tokens, I felt the need for a lightweight enrypting solution.
15
-
Nicator works like git-credential-store but it encrypts the saved credentials.
16
-
Therefore it should be decently secure.
14
+
With GitHub's move to personal access tokens, I felt the need for a lightweight encrypting solution.
15
+
Nicator works like git-credential-store but it encrypts the saved credentials, so it protects against the credentials file getting stolen.
16
+
__It does not do anything about malicious code being executed or its sockets and process memory getting read, especially after unlocking.__
17
17
Most of nicators dependencies are statically linked, so it does not require any uncommon dependencies.
18
18
19
19
## Usage
@@ -23,7 +23,7 @@ Most of nicators dependencies are statically linked, so it does not require any
23
23
4. Execute `nicator unlock` to enable storing and fetching credentials.
24
24
5. Execute `nicator lock` to disable storing and fetching credentials.
25
25
26
-
`nicator unlock -t SECONDS` allows specifying a timeout after which the credentials become inaccessable. It defaults to 1 hour. It might be handy to create a shell alias to change it consitently. The `-c` and `-s` flags can be used to change the path used for the credentials file and socket file respectively. These should not leak any data as long these files are only readable and writeable by the the file's owner, which nicator takes care of.
26
+
`nicator unlock -t SECONDS` allows specifying a timeout after which the credentials become inaccessible. It defaults to 1 hour. It might be handy to create a shell alias to change it consistently. The `-c` and `-s` flags can be used to change the path used for the credentials file and socket file respectively. These should not leak any data as long these files are only readable and writeable by the the file's owner, which nicator takes care of.
27
27
28
28
## How nicator works
29
29
Unlocking will automatically launch a nicator server/daemon process listening on a unix socket with appropriate permissions (found in `/tmp`), which keeps the password in-memory.
@@ -35,3 +35,4 @@ The passphrase is hashed using Argon2id.
35
35
## Security considerations
36
36
- You should trust the root user on your system.
37
37
- When hibernating your nicator password may be written to the disk if a nicator server is still running
38
+
- Malicious code may act like a valid the nicator client and read credentials from the unix socket after the credential store is unlocked
0 commit comments