[redacted]/docker-compose.yml:7
[AGENTS: Cipher - Egress - Supply]data_exfiltration, key_management, supply_chain
**Perspective 1:** POSTGRES_PASSWORD is hardcoded as 'password' in docker-compose.yml. This credential is visible in source control and can be exploited to gain database access. Never commit secrets to version control.
**Perspective 2:** POSTGRES_PASSWORD is hardcoded as 'password' in docker-compose.yml. This credential is committed to version control and can be extracted by anyone with repository access. Attack vector: credential theft, database access, lateral movement.
**Perspective 3:** The docker-compose.yml contains a comment with a hardcoded password 'password' which could be accidentally committed to version control or discovered during code review. While in a comment, this is still a security concern.
Suggested Fix
Remove hardcoded password. Use Docker secrets, environment variables from secure vault, or .env file with proper .gitignore protection. Example: POSTGRES_PASSWORD: ${DB_PASSWORD}