Issue Summary:
When configuring Redis Commander connections using Environment Variables (which include passwords), the application currently writes a config file to disk containing the plain text password. This poses a security risk, particularly in ephemeral and containerized environments such as Kubernetes (K8s), where disk persistence is not guaranteed and security best practices dictate against storing sensitive information on disk.
Expected Behavior:
When connections are configured via Environment Variables, sensitive information (like passwords) should be stored in memory only for the duration of the application's runtime.
No config file or plaintext password storage on disk should occur in this setup to enhance security.
Use Case Affected:
Primarily affects deployments in Kubernetes (K8s) and similar container orchestration environments where security and compliance requirements are stringent, and the ephemeral nature of pods dictates against storing sensitive data on disk.