I was tired of building bespoke static HTML sites and having to decide if I wanted to use GatsbyJS or just hand code all of the HTML. I decided to build a tool to solve my problem!
Do you store your API keys and other sensitive data with a site that doesn't even have a page discussing their encryption or security practices? Their privacy policy mentions they secure data with SSL protocol...
Who has access to each client's database? Is it audited? Is it encrypted at rest? I'm sure it is, but Config.ly would be wise to add this information to avoid fears.
Also you can store encrypted secrets in Git just fine, there are a number of methods to do so very safely.
Thanks for the feedback. The goal right now is not to store sensitive data in Config.ly - your read API keys will be on your clients - and so in theory anyone who can read that source code can fetch your keys.
> Who has access to each client's database? Is it audited? Is it encrypted at rest? I'm sure it is, but Config.ly would be wise to add this information to avoid fears.
Nice. I guess the big difference is the key used for the symmetric encryption. I'm using PBKDF2 to derive the final key to make it harder to brute force in case you get the HTML file.