Pensar - auto fix for Hardcoded Superuser Default Credentials Risk #858
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
The hard-coded fallback credentials ("[email protected]" and "default_password") for the default superuser were removed. Now, if
default_user_email
ordefault_user_password
are not set in the configuration, aRuntimeError
is raised, enforcing explicit specification of these values in configuration and preventing silent creation of insecure superuser accounts.More Details
is_superuser=True
, granting maximum privileges. Attackers who know or brute-force these default credentials can gain full control of the system. This violates secure credential handling practices (CWE-798: Use of Hard-coded Credentials).