15

pushing sensitive data to GitHub repo...not realising for days...and then going through the painful process of removing it again 😑

Comments
  • 2
    Oh boy what a fun day.
  • 1
    You have to assume the data is leaked. Change everything
  • 1
    I tend to not put any sensitive data in my repos to start with, always linking to a local file instead (~/.config?) or if others need the sensitive data, something behind credentials
  • 0
    @moshmage I believe they do detect aws keys give a warning. But indeed linking to a file is the way to go. Also a good .gitignore
Add Comment