Skip to content
Discussion options

You must be logged in to vote

To ensure that API keys, database credentials, and tokens are never exposed in commits or logs, we follow strict secret management and prevention practices:

Use Environment Variables & Secret Managers

Store all sensitive data (API keys, DB passwords, tokens) in environment variables, never hardcoded in the source code.

For deployment, use GitHub Actions Secrets, AWS Secrets Manager, or HashiCorp Vault to store credentials securely.

Developers use a local .env file (ignored by Git) and a public .env.example template for reference.

Prevent Leaks in Git Commits

Add .env, config files, and credential folders to the .gitignore file.

Use pre-commit hooks (like git-secrets or detect-secrets) to …

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by jomm2
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Code Security Build security into your GitHub workflow with features to keep your codebase secure Question Ask and answer questions about GitHub features and usage
2 participants