Skip to content

Secrets Handling Policy

  • No secrets, API keys, or tokens in this repository or in Docker images.
  • Local development uses mocked data or environment variables loaded at runtime.
  • Cloudflare Pages secrets (if required) must be scoped to individual projects.
ScenarioRecommended Store
Cloudflare Pages build secretsCloudflare Pages project settings
Worker runtime secrets (future)wrangler secret put
Local overrides.env.local ignored by git
  1. Request secrets through the security team; track approvals in the platform ticketing system.
  2. Store secrets in the approved platform store; never send via email or chat.
  3. Update this policy when new services are onboarded or storage mechanisms change.
  • Periodic scans (git-secrets or equivalent) before release.
  • Manual reviews of Cloudflare configuration during quarterly security checks.