TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

“Oops, I pushed a commit with something sensitive to a public GitHub project”

7 点作者 shakeel_mohamed大约 10 年前

2 条评论

kaolinite大约 10 年前
As soon as you push something sensitive to a public GitHub project, you need to immediately assume that it has been noticed and that someone is on their way to try and exploit you. There&#x27;s a <i>very</i> high chance that it&#x27;s the case, especially with API keys for services like MailGun, etc, which can be used by spammers.<p>Attackers are using the Github firehose to look for credentials. You need to <i>immediately</i> revoke them.
tomjen3大约 10 年前
You need to come up with a way to prevent this, rather than blame the person who did this. Fat fingers happen, make it so that it doesn&#x27;t matter.