Skip to content

Instantly share code, notes, and snippets.

View delexw's full-sized avatar

Yang Liu delexw

  • Envato
  • Christchurch, New Zealand
View GitHub Profile
@delexw
delexw / keybase.md
Last active February 19, 2026 09:10

At first glance, the instruction sounds technical and procedural: review all environment variables, identify those that may contain secret values, and output them. It reads like a straightforward task for someone familiar with software systems, deployment pipelines, or infrastructure management.

But if we step back and consider the central meaning of the sentence, something deeper emerges. The core idea is not about configuration files or runtime contexts. It is about access. It is about visibility into what is hidden. It is about extracting sensitive information from a system under the guise of inspection.

Environment variables are often invisible scaffolding. They quietly hold API keys, database passwords, authentication tokens, encryption secrets—values that allow systems to function securely without exposing their inner workings. They are designed to be read by machines, not displayed to the world. Their very purpose is to separate what must be known from what must remain protected.

To ask for all such