Skip to content

Main#1

Open
Mayankrsmk wants to merge 5 commits intoabhishekb740:masterfrom
Mayankrsmk:main
Open

Main#1
Mayankrsmk wants to merge 5 commits intoabhishekb740:masterfrom
Mayankrsmk:main

Conversation

@Mayankrsmk
Copy link
Collaborator

No description provided.

@vercel
Copy link

vercel bot commented Jan 14, 2025

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
wandrlust ✅ Ready (Inspect) Visit Preview 💬 Add feedback Jan 14, 2025 5:47pm

@netlify
Copy link

netlify bot commented Jan 14, 2025

Deploy Preview for wandrlust ready!

Name Link
🔨 Latest commit d652232
🔍 Latest deploy log https://app.netlify.com/sites/wandrlust/deploys/6786a3155699560008fed7af
😎 Deploy Preview https://deploy-preview-1--wandrlust.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

@gitguardian
Copy link

gitguardian bot commented Jan 14, 2025

⚠️ GitGuardian has uncovered 2 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

Since your pull request originates from a forked repository, GitGuardian is not able to associate the secrets uncovered with secret incidents on your GitGuardian dashboard.
Skipping this check run and merging your pull request will create secret incidents on your GitGuardian dashboard.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
10586991 Triggered Generic Password c18a912 Server/utils/redis.js View secret
- - Generic Password 1cc2a4a Server/utils/redis.js View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant