Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

False positives: Credentials are exposed in commit histories #58

Open
santrancisco opened this issue Nov 1, 2023 · 0 comments
Open

Comments

@santrancisco
Copy link

If you're reading this, you may have found some credentials in scripts of previous commits by our engineer during building & testing the app (password to a ClickHouse instance and a GCP IAM key for bucket access) - Don't worry, These credentials are already invalidated before this repository is made public.

However, if by any chance, you may have found a new working set of credentials, please do not hesistate to send an email to [email protected] and let us know.

Thank you for taking your time and attempt to report the issue with us.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant