Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Require a pre-commit step on all repos to prevent sensitive info from being committed #66

Open
jamesfwood opened this issue Jul 3, 2024 · 0 comments
Assignees
Labels

Comments

@jamesfwood
Copy link

jamesfwood commented Jul 3, 2024

"All repos should make sure no creds, keys, s3 buckets, or account numbers, etc. are committed
All repos should require a pre-commit library to commit, and if it's not setup on developer machine then it should give an error"

@jamesfwood jamesfwood added the Epic label Jul 3, 2024
@frankinspace frankinspace changed the title Update python repos to use GetLeeks to protect from pushing sensative info to Github Update python repos to use GitLeaks to protect from pushing sensitive info to Github Jul 3, 2024
@jamesfwood jamesfwood changed the title Update python repos to use GitLeaks to protect from pushing sensitive info to Github Require a pre-commit step on all repos to prevent sensitive info from being committed Sep 10, 2024
@jamesfwood jamesfwood removed this from hitide-24.3 Sep 10, 2024
@jamesfwood jamesfwood assigned sliu008 and unassigned cqbanh Sep 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants