6 lines
324 B
Plaintext
6 lines
324 B
Plaintext
Secret leaks often occur when a sensitive piece of authentication data is
|
|
stored with the source code of an application. Considering the source code is
|
|
intended to be deployed across multiple assets, including source code
|
|
repositories or application hosting servers, the secrets might get exposed to an
|
|
unintended audience.
|