Problem
auth login currently persists access tokens as plaintext in local configuration. This treats secrets like ordinary settings and does not meet modern CLI security expectations.
Root Cause Analysis
The authentication flow uses the same on-disk configuration path for both normal settings and persisted credentials. There is no dedicated credential storage abstraction and no secure OS-backed storage path, so secrets end up in a plaintext config file by design.
Fix Plan
- Replace plaintext token persistence with a dedicated secure credential storage approach.
- Keep normal CLI configuration separate from secret storage.
- Remove the current plaintext credential persistence path instead of maintaining backward compatibility.
- Preserve stable authenticated command behavior once credentials are stored through the new path.
Acceptance Criteria
Problem
auth logincurrently persists access tokens as plaintext in local configuration. This treats secrets like ordinary settings and does not meet modern CLI security expectations.Root Cause Analysis
The authentication flow uses the same on-disk configuration path for both normal settings and persisted credentials. There is no dedicated credential storage abstraction and no secure OS-backed storage path, so secrets end up in a plaintext config file by design.
Fix Plan
Acceptance Criteria
auth statusand other authenticated commands continue to work with the new storage flow.