Replace MinIO root credentials with scoped service account for production S3 access #133
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Priority: medium — must be resolved before production deployment
docker-compose.ymlconfigures the backend to use MinIO root credentials for S3 access (lines 97–98):The application should never hold root/admin credentials. If the backend is compromised, an attacker gains full MinIO/S3 admin access.
What to do
In production (Hetzner Object Storage or MinIO):
archive-documentsbucket (read + write, no admin operations).For local dev and CI, the root credentials remain acceptable.