android-keystore-generation
Audited by Socket on Feb 28, 2026
1 alert found:
SecurityThe workflow achieves its stated purpose of generating production and local development keystores and documenting setup details. However, it poses clear credential exposure risks due to plaintext password storage (KEYSTORE_INFO.txt and /tmp files) and is not CI/CD-friendly due to interactive prompts. To improve safety and automation compatibility, remove plaintext password artifacts, avoid logging or displaying passwords, shift secrets to ephemeral environment secrets, enforce non-interactive CI usage, and ensure KEYSTORE_INFO.txt either omits sensitive data or is securely protected/rotated. Maintain separate handling for production vs. local keystores and ensure proper gitignore configuration to prevent accidental leakage.