Because it is easy to extract strings from an application source code or binary, secrets should not be hard-coded. This is particularly true for applications that are distributed or that are open-source.
In the past, it has led to the following vulnerabilities:
Secrets should be stored outside of the source code in a configuration file or a management service for secrets.
This rule detects variables/fields having a name matching a list of words (secret, token, credential, auth, api[_.-]?key) being assigned a pseudorandom hard-coded value. The pseudorandomness of the hard-coded value is based on its entropy and the probability to be human-readable. The randomness sensibility can be adjusted if needed. Lower values will detect less random values, raising potentially more false positives.
There would be a risk if you answered yes to any of those questions.
const API_KEY = "1234567890abcdef" // Hard-coded secret (bad practice)
const response = await fetch("https://api.my-service/v1/users", {
headers: {
Authorization: `Bearer ${API_KEY}`,
},
});
const API_KEY = process.env.API_KEY;
const response = await fetch("https://api.my-service/v1/users", {
headers: {
Authorization: `Bearer ${API_KEY}`,
},
});