Back to all reviewers

Secure authentication state files

microsoft/playwright
Based on 2 comments
Markdown

Authentication state files (such as browser session files, cookies, or tokens) contain sensitive credentials that can lead to full account takeover if exposed. These files must never be committed to version control systems as they could be used to impersonate users or test accounts.

Security Markdown

Reviewer Prompt

Authentication state files (such as browser session files, cookies, or tokens) contain sensitive credentials that can lead to full account takeover if exposed. These files must never be committed to version control systems as they could be used to impersonate users or test accounts.

Prevention strategies:

  1. Use .gitignore: Add authentication directories to your .gitignore file and store files in dedicated directories like playwright/.auth/
  2. External storage: Store sensitive files outside the project directory using temporary directories

Example implementation:

// Option 1: Secure directory with .gitignore
{
  name: 'firefox',
  use: {
    storageState: 'playwright/.auth/user.json', // Add playwright/.auth to .gitignore
  },
}

// Option 2: Temporary directory (safer)
{
  name: 'firefox', 
  use: {
    storageState: `${mkdirtemp()}/playwright/.auth/user.json`,
  },
}

Always verify that authentication state files are properly excluded from version control and build artifacts to prevent credential exposure.

2
Comments Analyzed
Markdown
Primary Language
Security
Category

Source Discussions