-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[pre-commit.ci] pre-commit autoupdate #425
base: mwp_v1
Are you sure you want to change the base?
Conversation
1c9f87e
to
42806c1
Compare
42806c1
to
a9b482f
Compare
4bbf95b
to
0fbf375
Compare
0fbf375
to
7f2118d
Compare
783a6fd
to
16b639a
Compare
0a67d03
to
5a540f0
Compare
5a540f0
to
3691775
Compare
3691775
to
e2c1dcf
Compare
5d490ce
to
1de0e11
Compare
a1e9402
to
f70b051
Compare
438c1ab
to
b543007
Compare
e768d5d
to
ff3f72e
Compare
9e37a47
to
a11db54
Compare
|
GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
---|---|---|---|---|---|
11487171 | Triggered | Generic Password | f6cd9e5 | backend/.env.example | View secret |
11487172 | Triggered | Company Email Password | f6cd9e5 | backend/.env.example | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secrets safely. Learn here the best practices.
- Revoke and rotate these secrets.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
|
GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
---|---|---|---|---|---|
11487172 | Triggered | Company Email Password | 4b733c3 | tools/importer/import_bundestags_docs.py | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secret safely. Learn here the best practices.
- Revoke and rotate this secret.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
Query Performance Improvements
Sidebar tabs
updates: - [github.com/pre-commit/pre-commit-hooks: v4.6.0 → v5.0.0](pre-commit/pre-commit-hooks@v4.6.0...v5.0.0) - [github.com/astral-sh/ruff-pre-commit: v0.6.7 → v0.11.2](astral-sh/ruff-pre-commit@v0.6.7...v0.11.2) - [github.com/pre-commit/mirrors-eslint: v9.22.0 → v9.23.0](pre-commit/mirrors-eslint@v9.22.0...v9.23.0)
cec723f
to
01bc5bd
Compare
for more information, see https://pre-commit.ci
updates: