**Revoke the secret**
Revoke any leaked secrets and remove them from the application source code.
Before revoking the secret, ensure that no other applications or processes are
using it. Other usages of the secret will also be impacted when the secret is
revoked.