﻿id	summary	reporter	owner	description	type	status	component	version	severity	resolution	keywords	cc	stage	has_patch	needs_docs	needs_tests	needs_better_patch	easy	ui_ux
32465	Passwords in env variables should be hidden on debug page like other settings are.	galt	nobody	"Hundreds of blog pages tell people to put their settings for database and other passwords and keys
into env variables for easier management, and then settings.py reads those.  This is often described as a good way to avoid accidentally checking sensitive settings.py into source code control like git. But then the env variables are exposed in the django debug output with debug=true. Since django already hides 'API|TOKEN|KEY|SECRET|PASS|SIGNATURE' for django settings,  it should hide env variables too in the same way. 

Currently this problem is not easy to work around.

Having debug=false for production helps protect production servers. But some users use the same db user/password for both development and production systems. So leaking one leaks the other.

On rare occasions, people need to temporarily enable debug on production to solve some quick issue. So fixing the bug would make this safer.
"	Bug	closed	Error reporting	3.1	Normal	duplicate	env passwords debug		Unreviewed	0	0	0	0	0	0
