You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
DESCRIPTION
Secrets should never be checked into source code. Ideally, they should be injected into the runtime and then the values should be picked from there.
Examples of secrets are SSH keys, API keys and secrets (AWS or Stripe APIs, for example), database credentials etc.
BAD PRACTICE
In the sample Python code below, the secrets have been hardcoded:
key = "12345azan+/ryGUuk"
RECOMMENDED
Ideally, this should be picked from the environment, like:
DESCRIPTION
Secrets should never be checked into source code. Ideally, they should be injected into the runtime and then the values should be picked from there.
Examples of secrets are SSH keys, API keys and secrets (AWS or Stripe APIs, for example), database credentials etc.
BAD PRACTICE
In the sample Python code below, the secrets have been hardcoded:
key = "12345azan+/ryGUuk"
RECOMMENDED
Ideally, this should be picked from the environment, like:
key = os.getenv("SECRET_KEY")
Leaked "LinkedIn Client ID" detected in source: "IoLogoLinkedin"
src/config/icon.config.js
export const SocialFacebookIcon = IoLogoFacebook; // Social Facebook icon
export const SocialTwitterIcon = IoLogoTwitter; // Social Twitter icon
export const SocialGooglePlusIcon = IoLogoGoogleplus; // Social Google Plus icon
export const SocialLinkedinIcon = IoLogoLinkedin; // Social Linkedin icon
export const SocialDribbbleIcon = IoLogoDribbble; // Social Dribbble icon
The text was updated successfully, but these errors were encountered: