Appearance
Why It Matters
Forwarding secret-looking environment references through config broadens where sensitive data can flow and makes the config itself an implicit secret-routing policy.
What Triggers
SEC307 applies to parsed JSON config and triggers when a value forwards a sensitive-looking env reference that is not already covered by the stronger credential-key passthrough rule.
Example that triggers:
json
{"env":{"FORWARDER":"$ANOTHER_SECRET"}}Examples that stay clean:
json
{"env":{"WORKSPACE_ROOT":"${HOME}"}}
{"env":{"OPENAI_API_KEY":"${OPENAI_API_KEY}"}}The second example is handled by SEC303 instead.
False Positives
This rule stays Preview because it depends on sensitive env-name heuristics. It is intentionally suppressed when a stronger structural credential-env rule already explains the same line.
Remediation
Stop forwarding sensitive env references through committed config and resolve the secret only inside the service boundary that truly needs it.