The SSHKeys control verifies that all SSH private keys on your computer are encrypted with a passphrase. SSH keys are commonly used by developers and system administrators to authenticate to servers, push code to repositories, and access remote systems.
Important: An unencrypted SSH private key is like leaving your house key under the doormat. Anyone who gains access to your computer (through theft, malware, or even a backup) can use your SSH key to impersonate you. They can access any server, code repository, or system that trusts that key - without needing to know any passwords. Adding a passphrase encrypts the key, so even if someone steals the file, they cannot use it without the passphrase.
SSH keys often grant access to critical systems, production servers, and code repositories. Unencrypted keys allow anyone who steals them to impersonate you on these systems.
Stolen SSH keys can be used to push malicious code to your repositories, steal proprietary source code, or access sensitive company information stored in version control.
When someone uses your stolen SSH key, all actions appear to come from you, making it difficult to detect the breach and potentially implicating you in malicious activities.
After generating encrypted SSH keys, Citadel will automatically verify this control during its next check.
Note: If you've added the key to Keychain, macOS might auto-fill the passphrase. This is normal and secure.