-
Notifications
You must be signed in to change notification settings - Fork 4
[pre-commit.ci] pre-commit autoupdate #425
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
1c9f87e to
42806c1
Compare
42806c1 to
a9b482f
Compare
4bbf95b to
0fbf375
Compare
0fbf375 to
7f2118d
Compare
783a6fd to
16b639a
Compare
0a67d03 to
5a540f0
Compare
5a540f0 to
3691775
Compare
3691775 to
e2c1dcf
Compare
5d490ce to
1de0e11
Compare
a1e9402 to
f70b051
Compare
438c1ab to
b543007
Compare
9e37a47 to
a11db54
Compare
|
| GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
|---|---|---|---|---|---|
| 11487171 | Triggered | Generic Password | f6cd9e5 | backend/.env.example | View secret |
| 11487172 | Triggered | Company Email Password | f6cd9e5 | backend/.env.example | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secrets safely. Learn here the best practices.
- Revoke and rotate these secrets.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
️✅ There are no secrets present in this pull request anymore.If these secrets were true positive and are still valid, we highly recommend you to revoke them. 🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request. |
13265ff to
cc71d42
Compare
3443e7d to
49422d3
Compare
cec723f to
01bc5bd
Compare
f1cd4f3 to
0f32f54
Compare
a5454c5 to
3d14848
Compare
Interactive labeling
updates: - [github.com/pre-commit/pre-commit-hooks: v4.6.0 → v5.0.0](pre-commit/pre-commit-hooks@v4.6.0...v5.0.0) - [github.com/astral-sh/ruff-pre-commit: v0.6.7 → v0.12.3](astral-sh/ruff-pre-commit@v0.6.7...v0.12.3) - [github.com/pre-commit/mirrors-eslint: v9.22.0 → v9.31.0](pre-commit/mirrors-eslint@v9.22.0...v9.31.0)
2076292 to
c404c3f
Compare
for more information, see https://pre-commit.ci
updates: