You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 9, 2025. It is now read-only.
This opens up a "Rogue Certificate" man in the middle attack where a CA (or the owner of the tproxy domain) issues a malicious certificate. This could be used to steal the encrypted secrets. Basically the problem is introducing a reliance on the TLS PKI system in a core component that didn't need it.
One way to fix this is by passing the encryption key itself as a parameter or env var for the CLI.
I think the best place to get the reference values will ultimately be the on-chain KMS but less clear of a next step (include a light client in this cli too?)