Skip to content

🔐 PII Found in Code (access_token.sh) – Needs Removal & Refactor #662

@iBixee

Description

@iBixee

There is a personal email address hard-coded directly in the script:

File: peviitor-ro/based_scraper_py/access_token.sh
Line: EMAIL="example_personal_email@gmail.com"

This exposes personal data (PII) and should not be present in source code. In addition, storing any credentials or tokens directly in code is not compliant with security and privacy best practices.

Required actions:
• Remove the personal email from the code.
• Refactor the script to use an environment variable ($EMAIL or .env file).
• If the email was being used to retrieve or generate active access tokens, verify whether any tokens need to be rotated/revoked.
• Remove the email from repository history (not just from a single commit).

I have not modified or removed any data myself. This is just the notification so the appropriate maintainers can address it.

Storing PII in scripts breaks both privacy compliance and secure coding standards, so switching to environment variables here is the correct long-term fix.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions