Ansible vault. All my config files and scripts are deployed with Ansible. Usually they are pushing those into a file or environment variable but if you scope permissions narrowly and don’t run services/containers as root you should be somewhat safe. If someone has filesystem access you’re already in big trouble.
Instead I’d focus on keeping your attack surface as small as possible. Keep services behind a VPN or segment public facing services to a separate VLAN or docker network.
It looks like some sort of issue with pict-rs, the image backend for Lemmy. I haven’t paid enough attention to see which instances are having problems.
Does my user image show up? I’m hosting a tiny Lemmy instance just for myself.