ripsecrets 0.1.11

A command-line tool to prevent committing secret keys into your source code
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
sk_live_ReTllpYQYfIZu2Jnf2lAPFjD // pragma: allowlist secret
secret = "asdfasdfasdfasdfasdfasdfasdfasdfasdfasdfasdfasdf"
-----BEGIN PRIVATE KEY-----this is not a private key-----END PRIVATE KEY-----
CLIENT_SECRET = settings.GITHUB_API_SECRET
ACCESS_TOKEN_URL = ASANA_TOKEN_EXCHANGE_URL
return keyJob.start() # can look like a JWT due to containing eyJ
WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY = OFF, ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON)
req.POST = {"head_long": "v999", "url": "http://example.com", "user": "wrong@example.com"}
http://public:secret@example.com/1
project_key = PROJECT_NAME_ALIAS
postgresql://user:user@no_connection/no_db
postgresql://user:ReTllpYQYfIZu2Jnf2lAPFjD@no_connection/no_db // secret is in .secretsignore