telexed ~ c / dc76e07b-ae3radar:40 · otherLIVE
← back
NO.
#dc76e07b
Topic
OTHER
Source
GeekNews
Published
2026-05-09 17:02:22
Importance
★ 4/10 — radar 40
`NixOS` Secrets: Plaintext in `Nix store` Is Readable
FIG-0071:1

`NixOS` Secrets: Plaintext in `Nix store` Is Readable

Putting secrets in Nix config, private Git, or git-crypt plaintext still leaks them through Nix store. sops-nix is the practical baseline if you deploy with NixOS; otherwise your server access model is already broken.

[ KEY POINTS ]
  1. Secrets embedded in Nix config can end up in Nix store, which is world-readable on the machine; repo privacy does not help after deploy.
  2. Keeping values in a private repo or decrypting with git-crypt before build still leaves plaintext artifacts in the store, so the leak point moves to runtime.
  3. sops-nix uses .sops.yaml rules and encrypted-file editing flow, giving a cleaner path than ad hoc secret injection for NixOS setups.
Originalnews.hada.io/topic?id=29328Read original →

// related