(Forgive my top-reply, but this part of the message is intended to summarize all replies in the thread.) Thanks, everyone for the thoughtful comments. I appreciate the multiple directions recommended in the thread, including making this config be a tri-state with these states: 1. Keep existing behavior. 2. Warn if Git sees credentials in a URL. 3. Die if Git sees credentials in a URL. This approach provides a good mechanism for transitioning from the current state (1) to the die state (3): we can set (2) as default for a while. I believe something like this will be necessary to alert users who have already created repositories with credentials in their .git/config files. But, there is something better we can do that will be more helpful for users still using this at "git clone" time, without causing serious damage to automated scenarios: On 4/30/2021 2:50 PM, Jeff King wrote: > On Fri, Apr 30, 2021 at 06:37:24PM +0000, Derrick Stolee via GitGitGadget wrote: > >> From: Derrick Stolee <dstolee@xxxxxxxxxxxxx> >> >> Git allows URLs of the following pattern: >> >> https://username:password@domain/route >> >> These URLs are then parsed to pull out the username and password for use >> when authenticating with the URL. Git is careful to anonymize the URL in >> status messages with transport_anonymize_url(), but it stores the URL as >> plaintext in the .git/config file. The password may leak in other ways. > > I'm not really opposed to disallowing this entirely (with an escape > hatch, as you have here), because it really is an awful practice for a > lot of reasons. But another option we discussed previously was to allow > the initial clone, but not store the password, which would result in the > user being prompted for subsequent fetches: > > https://lore.kernel.org/git/20190519050724.GA26179@xxxxxxxxxxxxxxxxxxxxx/ > > I think that third patch there is just too gross. But with the first > two, if you do have a credential helper configured, then: > > git clone https://user:pass@xxxxxxxxxxx/repo.git > > would do what you want: clone with that user/pass, and then store the > result in the credential helper. This seems like the best approach, as it presents the highest likelihood of working as expected in the automated scenarios. I will take a look to see how I could adapt those patches and maybe make the third one better. I think a combined approach would be good. We should still warn that this usage pattern is unsafe, because users might use it in an environment where their commands are being logged and stored another way. Is it possible that some Git installations have no credential helper? We can keep the "git clone" working in that scenario by storing the password in memory until the process completes, but later "git fetch" commands will fail. Thanks, -Stolee