connect icon indicating copy to clipboard operation
connect copied to clipboard

dummy PR to test graphql github app

Open ericbolikowski opened this issue 3 years ago • 1 comments

What Github issue does this PR relate to? Insert link.

What should the reviewer know?

ericbolikowski avatar Apr 01 '23 01:04 ericbolikowski

⚠️ GitGuardian has uncovered 4 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id Secret Commit Filename
753993 Generic High Entropy Secret b3e7f20aa522aa9a7e750db89dc32b1519696f3c nx.json View secret
753993 Generic High Entropy Secret ad5445bbbd5889e34d16211c649435a9a1e4de0f nx.json View secret
753993 Generic High Entropy Secret 863d3337f39430ff8d4fecfee8f8598aa0b7a728 nx.json View secret
753993 Generic High Entropy Secret e7ef109e4185b8be19b11688b0277273d47da188 nx.json View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

Our GitHub checks need improvements? Share your feedbacks!

gitguardian[bot] avatar Apr 27 '23 20:04 gitguardian[bot]