Skip to content
This repository was archived by the owner on Aug 22, 2025. It is now read-only.

Conversation

@rhailrake
Copy link
Contributor

@rhailrake rhailrake commented May 2, 2024

Summary by CodeRabbit

  • Новые функции

    • Обновлены окна персонажа для отображения статистики и навыков игрока.
    • Добавлена система боевой музыки, которая активируется во время боя.
    • Реализована функция широковещательной передачи сообщений в чате для нескольких получателей.
    • Внедрены изменения на основе навыков и статистики для медицинских систем, включая дефибриллятор и лечение.
    • Улучшена система ближнего боя с новыми действиями и сообщениями.
    • Введена система предсказуемого рандома для продвинутой генерации случайных значений.
    • Навыки и статистика теперь зависят от назначений на работу.
  • Исправления ошибок

    • Исправлена логика обследования здоровья с учетом уровней навыков пользователя.
  • Локализация

    • Обновлены русские локализации для различных меток интерфейса.

@ThereDrD0
Copy link
Contributor

@coderabbitai review

@coderabbitai
Copy link

coderabbitai bot commented Jun 18, 2024

Actions performed

Review triggered.

Note: CodeRabbit is an incremental review system and does not re-review already reviewed commits. This command is applicable only when automatic reviews are paused.

@coderabbitai
Copy link

coderabbitai bot commented Jun 18, 2024

Walkthrough

Внесены значительные обновления в клиентские и серверные компоненты для интеграции новых систем навыков и статистики, динамического управления атрибутами игроков и улучшения боевых и медицинских функций. Ключевые изменения включают добавление зависимостей для управления игроками, обновление элементов пользовательского интерфейса, введение управления музыкой в боевых сценариях и уточнение различных игровых систем с учетом навыков и статистики игроков для действий и событий.

Changes

Files and Directories Change Summary
Content.Client/UserInterface/Systems/Character/CharacterUIController.cs Добавлены зависимости для EntityManager и PlayerManager. Реализованы методы для отображения статистики и навыков игрока.
Content.Client/UserInterface/Systems/Character/Windows/CharacterWindow.xaml Обновлены метки и добавлены новые RichTextLabels для "Статистики" и "Навыков".
Content.Client/_Lfwb/CombatMusic.cs Введен класс CombatMusic для управления боевой музыкой на основе действий игрока.
Content.Server/Chat/Managers/ChatManager.cs, Content.Server/Chat/Managers/IChatManager.cs Добавлен метод для трансляции сообщений нескольким получателям через консольный хост.
Content.Server/HealthExaminable/HealthExaminableSystem.cs Добавлены проверки уровня навыков перед действиями в методе OnGetExamineVerbs.
Content.Server/Medical/DefibrillatorSystem.cs, Content.Server/Medical/HealingSystem.cs, Content.Server/Medical/HealthAnalyzerSystem.cs Интегрированы SharedSkillsSystem и SharedStatsSystem. Изменено поведение в зависимости от уровней навыков для медицинских действий.
Content.Server/Weapons/Melee/MeleeWeaponSystem.cs, Content.Shared/Weapons/Melee/SharedMeleeWeaponSystem.cs Добавлена обработка сообщений чата и разнообразные боевые действия (промахи, парирования, уклонения, критические удары). Улучшены боевые взаимодействия с учетом навыков и статистики.
Content.Server/_Lfwb/Skills/SkillsSystem.cs, Content.Server/_Lfwb/Stats/StatsSystem.cs Добавлены системы для инициализации и изменения статистики и навыков игрока на основе назначения работы.
Content.Server/_White/Other/ExamineSystem/ExamineSystem.cs Добавлена логика для сравнения статистики силы во время осмотров.
Content.Server/_White/Wizard/Magic/WizardSpellsSystem.cs Добавлены проверки для критических, мертвых или закованных исполнителей перед произнесением заклинаний.
Content.Shared/Damage/DamageSpecifier.cs, Content.Shared/Damage/Systems/StaminaSystem.cs Добавлены новые методы для применения и умножения значений к записям урона. Изменен CritThreshold выносливости на основе изменений статов.
Content.Shared/Mobs/Systems/MobThresholdSystem.cs Обновлено для обработки изменений статов и перерасчета порогов на основе стата Strength.
Content.Shared/Roles/JobPrototype.cs Введены поля и логика для модификаций статистики и навыков, связанных с работой.
Content.Shared/Stunnable/SharedStunSystem.cs Обновлена логика, чтобы исключить проверку, может ли сущность встать после падения через клавишу.
Content.Shared/Weapons/Melee/MeleeWeaponComponent.cs Изменена инициализация свойства CanHeavyAttack.
Content.Shared/Weapons/Ranged/Components/GunComponent.cs Удалены ненужные импорты и добавлены новые сетевые поля для различных свойств оружия.
Content.Shared/_Lfwb/PredictedRandom/PredictedRandom.cs Добавлен PredictedRandomSystem для генерации случайных чисел и определения вероятностей.
Content.Shared/_Lfwb/Skills/JobSkillsModification.cs Введен класс JobSkillsModification для управления модификациями навыков, связанных с работой.
Content.Shared/_Lfwb/Stats/JobStatsModification.cs, Content.Shared/_Lfwb/Stats/SharedStatsSystem.cs Добавлены системы и прототипы для управления модификациями статистики, связанных с работой, и бросками кубиков.
Resources/Locale/ru Обновлены локализованные тексты для русского языка, включая метки для "Статистики" и "Навыков".

Sequence Diagram(s)

Poem

В землях кода, где байты играют,
Статистика и навыки выходят на свет.
С боевыми мелодиями, что отмечают бой,
И искусством исцеления в новом свете.
Судьбы игроков теперь переплетены,
В этой великой игре, так четко определенной.
✨🎮🐇


📜 Recent review details

Configuration used: CodeRabbit UI
Review profile: ASSERTIVE
Plan: Free

📥 Commits

Reviewing files that changed from the base of the PR and between 789c517 and b216759.

⛔ Files ignored due to path filters (3)
  • Resources/Audio/White/Combat/dodge.ogg is excluded by !**/*.ogg
  • Resources/Audio/White/Combat/parry.ogg is excluded by !**/*.ogg
  • Resources/White/Audio/Insanity/maniac.ogg is excluded by !**/*.ogg
📒 Files selected for processing (54)
  • Content.Client/UserInterface/Systems/Character/CharacterUIController.cs (3 hunks)
  • Content.Client/UserInterface/Systems/Character/Windows/CharacterWindow.xaml (1 hunks)
  • Content.Client/_Lfwb/CombatMusic.cs (1 hunks)
  • Content.Server/Chat/Managers/ChatManager.cs (3 hunks)
  • Content.Server/Chat/Managers/IChatManager.cs (1 hunks)
  • Content.Server/HealthExaminable/HealthExaminableSystem.cs (3 hunks)
  • Content.Server/Medical/DefibrillatorSystem.cs (5 hunks)
  • Content.Server/Medical/HealingSystem.cs (6 hunks)
  • Content.Server/Medical/HealthAnalyzerSystem.cs (4 hunks)
  • Content.Server/Weapons/Melee/MeleeWeaponSystem.cs (3 hunks)
  • Content.Server/_Lfwb/Skills/SkillsSystem.cs (1 hunks)
  • Content.Server/_Lfwb/Stats/StatsSystem.cs (1 hunks)
  • Content.Server/_White/Other/ExamineSystem/ExamineSystem.cs (3 hunks)
  • Content.Server/_White/Wizard/Magic/WizardSpellsSystem.cs (4 hunks)
  • Content.Shared/Damage/DamageSpecifier.cs (2 hunks)
  • Content.Shared/Damage/Systems/StaminaSystem.cs (2 hunks)
  • Content.Shared/Mobs/Systems/MobThresholdSystem.cs (2 hunks)
  • Content.Shared/Roles/JobPrototype.cs (2 hunks)
  • Content.Shared/Stunnable/SharedStunSystem.cs (1 hunks)
  • Content.Shared/Weapons/Melee/MeleeWeaponComponent.cs (1 hunks)
  • Content.Shared/Weapons/Melee/SharedMeleeWeaponSystem.cs (8 hunks)
  • Content.Shared/Weapons/Ranged/Components/GunComponent.cs (5 hunks)
  • Content.Shared/_Lfwb/PredictedRandom/PredictedRandom.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/JobSkillsModification.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/SharedSkillsSystem.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/SkibidiShootingSystem.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/Skill.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/SkillsComponent.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/JobStatsModification.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/SharedStatsSystem.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/Stat.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/StatsComponent.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/StatsPresetPrototype.cs (1 hunks)
  • Resources/Locale/ru-RU/_white/stats.ftl (1 hunks)
  • Resources/Locale/ru-RU/health-examinable/health-examinable-carbon.ftl (1 hunks)
  • Resources/Locale/ru-RU/medical/components/health-analyzer-component.ftl (1 hunks)
  • Resources/Maps/White/Polaris.yml (1 hunks)
  • Resources/Maps/White/Scoupidia.yml (1 hunks)
  • Resources/Prototypes/Entities/Mobs/NPCs/hellspawn.yml (1 hunks)
  • Resources/Prototypes/Entities/Mobs/NPCs/regalrat.yml (1 hunks)
  • Resources/Prototypes/Entities/Mobs/Species/base.yml (1 hunks)
  • Resources/Prototypes/Entities/Objects/Specific/Mech/mechs.yml (3 hunks)
  • Resources/Prototypes/Entities/Objects/Specific/Research/anomaly.yml (1 hunks)
  • Resources/Prototypes/Entities/Objects/Tools/gas_tanks.yml (2 hunks)
  • Resources/Prototypes/Entities/Objects/Weapons/Melee/cult.yml (2 hunks)
  • Resources/Prototypes/Entities/Objects/Weapons/Melee/fireaxe.yml (1 hunks)
  • Resources/Prototypes/Entities/Objects/Weapons/Melee/pickaxe.yml (1 hunks)
  • Resources/Prototypes/Entities/Objects/Weapons/Melee/sword.yml (1 hunks)
  • Resources/Prototypes/Maps/Pools/White.yml (1 hunks)
  • Resources/Prototypes/Maps/Whitebox.yml (0 hunks)
  • Resources/Prototypes/SoundCollections/white.yml (1 hunks)
  • Resources/Prototypes/_White/Entities/Objects/Weapons/chaplain_weapons.yml (1 hunks)
  • Resources/Prototypes/_White/Entities/Objects/Weapons/energy_axe.yml (1 hunks)
  • Resources/Prototypes/_White/stats.yml (1 hunks)
💤 Files with no reviewable changes (1)
  • Resources/Prototypes/Maps/Whitebox.yml

Note

🎁 Summarized by CodeRabbit Free

Your organization is on the Free plan. CodeRabbit will generate a high-level summary and a walkthrough for each pull request. For a comprehensive line-by-line review, please upgrade your subscription to CodeRabbit Pro by visiting https://app.coderabbit.ai/login.

🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR. (Beta)
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 20

Outside diff range and nitpick comments (4)
Resources/Maps/White/Scoupidia.yml (1)

Line range hint 165-165: AWS credentials detected in the file, posing a security risk.

Please remove or securely manage these credentials to prevent unauthorized access.

Also applies to: 189-189, 193-193, 337-337, 341-341, 445-445, 449-449, 453-453, 457-457, 461-461, 469-469, 473-473, 477-477, 481-481, 485-485, 489-489, 505-505, 509-509, 517-517, 521-521

Content.Server/Weapons/Melee/MeleeWeaponSystem.cs (1)

39-39: Consider using more descriptive method names than HellMessage.

The method name HellMessage is not self-explanatory and could be improved for better readability and maintainability of the code. Consider renaming it to something more descriptive of its functionality.

Content.Shared/Weapons/Melee/SharedMeleeWeaponSystem.cs (2)

4-6: ### Review of Dependencies and System Integrations

The introduction of multiple dependencies (SharedStatsSystem, SharedSkillsSystem, PredictedRandomSystem, SharedStandingStateSystem, StatusEffectsSystem, SharedCombatModeSystem, INetManager, SharedStunSystem, SharedAudioSystem) enhances the system's capabilities but also increases its complexity. Ensure that these dependencies are justified by the system's requirements and that they do not introduce tight coupling that could affect maintainability.

Also applies to: 28-31, 34-34, 61-69


73-79: ### Review of MissMessages List Initialization

The initialization of MissMessages with specific strings is straightforward. However, consider externalizing these messages to a resource file or a configuration setting to facilitate easier localization and management without modifying the codebase.

Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

Commits

Files that changed from the base of the PR and between 789c517 and b216759.

Files ignored due to path filters (3)
  • Resources/Audio/White/Combat/dodge.ogg is excluded by !**/*.ogg
  • Resources/Audio/White/Combat/parry.ogg is excluded by !**/*.ogg
  • Resources/White/Audio/Insanity/maniac.ogg is excluded by !**/*.ogg
Files selected for processing (53)
  • Content.Client/UserInterface/Systems/Character/CharacterUIController.cs (3 hunks)
  • Content.Client/UserInterface/Systems/Character/Windows/CharacterWindow.xaml (1 hunks)
  • Content.Client/_Lfwb/CombatMusic.cs (1 hunks)
  • Content.Server/Chat/Managers/ChatManager.cs (3 hunks)
  • Content.Server/Chat/Managers/IChatManager.cs (1 hunks)
  • Content.Server/HealthExaminable/HealthExaminableSystem.cs (3 hunks)
  • Content.Server/Medical/DefibrillatorSystem.cs (5 hunks)
  • Content.Server/Medical/HealingSystem.cs (6 hunks)
  • Content.Server/Medical/HealthAnalyzerSystem.cs (4 hunks)
  • Content.Server/Weapons/Melee/MeleeWeaponSystem.cs (3 hunks)
  • Content.Server/_Lfwb/Skills/SkillsSystem.cs (1 hunks)
  • Content.Server/_Lfwb/Stats/StatsSystem.cs (1 hunks)
  • Content.Server/_White/Other/ExamineSystem/ExamineSystem.cs (3 hunks)
  • Content.Server/_White/Wizard/Magic/WizardSpellsSystem.cs (4 hunks)
  • Content.Shared/Damage/DamageSpecifier.cs (2 hunks)
  • Content.Shared/Damage/Systems/StaminaSystem.cs (4 hunks)
  • Content.Shared/Mobs/Systems/MobThresholdSystem.cs (2 hunks)
  • Content.Shared/Roles/JobPrototype.cs (2 hunks)
  • Content.Shared/Stunnable/SharedStunSystem.cs (1 hunks)
  • Content.Shared/Weapons/Melee/MeleeWeaponComponent.cs (1 hunks)
  • Content.Shared/Weapons/Melee/SharedMeleeWeaponSystem.cs (9 hunks)
  • Content.Shared/Weapons/Ranged/Components/GunComponent.cs (7 hunks)
  • Content.Shared/_Lfwb/PredictedRandom/PredictedRandom.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/JobSkillsModification.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/SharedSkillsSystem.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/SkibidiShootingSystem.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/Skill.cs (1 hunks)
  • Content.Shared/_Lfwb/Skills/SkillsComponent.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/JobStatsModification.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/SharedStatsSystem.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/Stat.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/StatsComponent.cs (1 hunks)
  • Content.Shared/_Lfwb/Stats/StatsPresetPrototype.cs (1 hunks)
  • Resources/Locale/ru-RU/_white/stats.ftl (1 hunks)
  • Resources/Locale/ru-RU/health-examinable/health-examinable-carbon.ftl (1 hunks)
  • Resources/Locale/ru-RU/medical/components/health-analyzer-component.ftl (1 hunks)
  • Resources/Maps/White/Polaris.yml (1 hunks)
  • Resources/Maps/White/Scoupidia.yml (1 hunks)
  • Resources/Prototypes/Entities/Mobs/NPCs/hellspawn.yml (1 hunks)
  • Resources/Prototypes/Entities/Mobs/NPCs/regalrat.yml (1 hunks)
  • Resources/Prototypes/Entities/Mobs/Species/base.yml (1 hunks)
  • Resources/Prototypes/Entities/Objects/Specific/Mech/mechs.yml (3 hunks)
  • Resources/Prototypes/Entities/Objects/Specific/Research/anomaly.yml (1 hunks)
  • Resources/Prototypes/Entities/Objects/Tools/gas_tanks.yml (2 hunks)
  • Resources/Prototypes/Entities/Objects/Weapons/Melee/cult.yml (2 hunks)
  • Resources/Prototypes/Entities/Objects/Weapons/Melee/fireaxe.yml (1 hunks)
  • Resources/Prototypes/Entities/Objects/Weapons/Melee/pickaxe.yml (1 hunks)
  • Resources/Prototypes/Entities/Objects/Weapons/Melee/sword.yml (1 hunks)
  • Resources/Prototypes/Maps/Pools/White.yml (1 hunks)
  • Resources/Prototypes/SoundCollections/white.yml (1 hunks)
  • Resources/Prototypes/_White/Entities/Objects/Weapons/chaplain_weapons.yml (1 hunks)
  • Resources/Prototypes/_White/Entities/Objects/Weapons/energy_axe.yml (1 hunks)
  • Resources/Prototypes/_White/stats.yml (1 hunks)
Files not reviewed due to errors (2)
  • Resources/Maps/White/Polaris.yml (Error: unable to parse review)
  • Resources/Prototypes/Entities/Objects/Specific/Research/anomaly.yml (no review received)
Files skipped from review due to trivial changes (9)
  • Content.Shared/_Lfwb/Skills/Skill.cs
  • Resources/Locale/ru-RU/_white/stats.ftl
  • Resources/Locale/ru-RU/health-examinable/health-examinable-carbon.ftl
  • Resources/Locale/ru-RU/medical/components/health-analyzer-component.ftl
  • Resources/Prototypes/Entities/Objects/Weapons/Melee/cult.yml
  • Resources/Prototypes/Maps/Pools/White.yml
  • Resources/Prototypes/SoundCollections/white.yml
  • Resources/Prototypes/_White/Entities/Objects/Weapons/chaplain_weapons.yml
  • Resources/Prototypes/_White/stats.yml
Additional context used
Gitleaks
Resources/Maps/White/Polaris.yml

188-188: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


188-188: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


188-188: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


188-188: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


188-188: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


188-188: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


188-188: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


188-188: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


188-188: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


192-192: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


196-196: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


196-196: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


200-200: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


212-212: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


216-216: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


220-220: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


220-220: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


220-220: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


220-220: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


224-224: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


224-224: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


224-224: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


224-224: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


224-224: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


224-224: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


224-224: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


224-224: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


228-228: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


260-260: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


260-260: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


264-264: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


264-264: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


264-264: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


264-264: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


268-268: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


272-272: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


272-272: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


272-272: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


272-272: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


276-276: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


276-276: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


284-284: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


284-284: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


284-284: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


284-284: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


284-284: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


284-284: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


284-284: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


284-284: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


288-288: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


288-288: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


288-288: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


288-288: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


288-288: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


288-288: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


292-292: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


292-292: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


292-292: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


292-292: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


292-292: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


300-300: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


300-300: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


300-300: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


340-340: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


348-348: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


352-352: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


352-352: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


356-356: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


364-364: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


364-364: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


364-364: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


364-364: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


372-372: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


376-376: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


376-376: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


376-376: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


376-376: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


376-376: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


376-376: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


376-376: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


376-376: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


460-460: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


460-460: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


460-460: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


460-460: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


460-460: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


460-460: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


460-460: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


464-464: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


468-468: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


468-468: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


468-468: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


468-468: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


468-468: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


468-468: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


468-468: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


472-472: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


472-472: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


472-472: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


472-472: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


472-472: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


472-472: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


472-472: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


476-476: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


476-476: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


476-476: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


476-476: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


476-476: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


476-476: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


480-480: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


480-480: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


480-480: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


480-480: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


480-480: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


480-480: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


480-480: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


500-500: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


504-504: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


504-504: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


504-504: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


504-504: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


504-504: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


504-504: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


524-524: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


524-524: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


524-524: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


524-524: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


524-524: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


524-524: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


524-524: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


528-528: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


528-528: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


540-540: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


548-548: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


548-548: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


552-552: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


552-552: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


552-552: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


564-564: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


564-564: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


564-564: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


576-576: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


576-576: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


576-576: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


576-576: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


596-596: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


604-604: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


604-604: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


604-604: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


604-604: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


628-628: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


632-632: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


632-632: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


632-632: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


632-632: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


636-636: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


640-640: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


640-640: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


640-640: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


640-640: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


640-640: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


640-640: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


640-640: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


660-660: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


664-664: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


664-664: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


692-692: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


692-692: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


696-696: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


696-696: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


704-704: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


732-732: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


732-732: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


732-732: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


732-732: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


736-736: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


736-736: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


744-744: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


748-748: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


748-748: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


768-768: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


772-772: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


772-772: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


772-772: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


772-772: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


772-772: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


772-772: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


772-772: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


772-772: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


772-772: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


776-776: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


776-776: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


776-776: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


784-784: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


812-812: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


812-812: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


812-812: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


812-812: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


812-812: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


812-812: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


812-812: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


812-812: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


816-816: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


816-816: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


816-816: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


816-816: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


816-816: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


824-824: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


824-824: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


824-824: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


824-824: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


824-824: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


824-824: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


824-824: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


852-852: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


852-852: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


852-852: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


852-852: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


852-852: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


856-856: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


856-856: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


856-856: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


856-856: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


856-856: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


868-868: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


892-892: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


892-892: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


896-896: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


896-896: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


896-896: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


896-896: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


896-896: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


896-896: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


896-896: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


896-896: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


896-896: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


904-904: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


908-908: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


912-912: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


912-912: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


912-912: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


912-912: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


912-912: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


912-912: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


912-912: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


936-936: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


936-936: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


936-936: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


936-936: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


936-936: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


936-936: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


936-936: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


936-936: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


940-940: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


940-940: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


940-940: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


948-948: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


952-952: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


956-956: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


972-972: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


972-972: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


972-972: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


972-972: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


972-972: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


972-972: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


972-972: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


972-972: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


972-972: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


976-976: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


976-976: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


976-976: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


976-976: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


976-976: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


988-988: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


988-988: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


988-988: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


992-992: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


996-996: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


996-996: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


996-996: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


996-996: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


996-996: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


996-996: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


996-996: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


996-996: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1000-1000: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1000-1000: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1000-1000: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1000-1000: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1000-1000: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1004-1004: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1008-1008: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1012-1012: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1012-1012: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1012-1012: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1012-1012: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1012-1012: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1012-1012: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1012-1012: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1032-1032: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1032-1032: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1036-1036: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1036-1036: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1036-1036: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1036-1036: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1036-1036: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1040-1040: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1040-1040: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1040-1040: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1040-1040: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1040-1040: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1040-1040: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1044-1044: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1044-1044: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1044-1044: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1044-1044: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1044-1044: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1044-1044: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1048-1048: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1060-1060: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1100-1100: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1100-1100: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


1104-1104: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


2120-2120: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


2120-2120: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


2120-2120: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


2120-2120: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


2120-2120: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)

Resources/Maps/White/Scoupidia.yml

165-165: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


165-165: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


165-165: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


165-165: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


165-165: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


165-165: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


165-165: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


189-189: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


193-193: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


337-337: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


337-337: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


337-337: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


337-337: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


341-341: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


341-341: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


341-341: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


445-445: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


449-449: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


453-453: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


453-453: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


453-453: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


453-453: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


453-453: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


453-453: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


453-453: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


457-457: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


457-457: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


457-457: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


461-461: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


469-469: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


473-473: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


473-473: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


473-473: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


473-473: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


473-473: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


473-473: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


473-473: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


473-473: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


473-473: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


477-477: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


477-477: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


477-477: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


481-481: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


481-481: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


481-481: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


481-481: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


485-485: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


489-489: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


505-505: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


509-509: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


509-509: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


509-509: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


509-509: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


509-509: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


509-509: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


509-509: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


509-509: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


517-517: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


517-517: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


521-521: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


521-521: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


521-521: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


521-521: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


521-521: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


521-521: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


521-521: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


521-521: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)


521-521: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms. (aws-access-token)

Additional comments not posted (41)
Content.Shared/_Lfwb/Stats/StatsPresetPrototype.cs (1)

5-13: Stat presets prototype definition looks correct and concise.

Ensure that the dictionary keys and values are properly validated elsewhere in the code to prevent runtime errors.

Content.Shared/_Lfwb/Stats/JobStatsModification.cs (1)

5-13: Job stats modification prototype definition looks correct and concise.

Ensure that the dictionary keys and values are properly validated elsewhere in the code to prevent runtime errors.

Content.Shared/_Lfwb/Skills/JobSkillsModification.cs (1)

5-13: Job skills modification prototype definition looks correct and concise.

Ensure that the dictionary keys and values are properly validated elsewhere in the code to prevent runtime errors.

Content.Shared/_Lfwb/Stats/Stat.cs (2)

5-13: The Stat enum is well-defined and appropriately marked for serialization. Good use of concise, clear naming for the enum values.


15-16: The StatChangedEvent record is well-structured and provides all necessary information for stat change events, including initialization status. This will be useful for debugging and tracking stat changes effectively.

Content.Shared/_Lfwb/Skills/SkillsComponent.cs (1)

6-16: The SkillsComponent class is correctly annotated with component registration and networking attributes, ensuring it integrates well with the game's entity system. The initialization of the Skills dictionary with default values is a good practice, ensuring that all skills have a baseline upon component creation.

Content.Shared/_Lfwb/Stats/StatsComponent.cs (1)

5-21: The StatsComponent class is appropriately annotated for component registration and networking. The use of ValidatePrototypeId for StatsPreset ensures that only valid prototype IDs are used, which is crucial for maintaining data integrity. The initialization of the Stats dictionary with default values is well-handled, ensuring each stat has a baseline value.

Resources/Prototypes/Entities/Objects/Weapons/Melee/pickaxe.yml (2)

15-15: The configuration for the pickaxe entity, especially the MeleeWeapon component, is well-defined. The attackRate and damage properties are set appropriately, balancing the gameplay for mining activities.


15-15: The mining drill entity is well-configured with an autoAttack feature, which is suitable for its intended use. This should enhance the user experience by allowing continuous drilling without repeated user input.

Content.Server/_Lfwb/Skills/SkillsSystem.cs (1)

17-17: Good use of event subscription to integrate player spawn handling.

Resources/Prototypes/Entities/Objects/Weapons/Melee/fireaxe.yml (1)

17-17: Ensure the attackRate aligns with game balance requirements.

Verification successful

The attackRate of 1 for the fireaxe is consistent with other melee weapons such as the pickaxe and certain swords. Given the range of attackRate values observed, the fireaxe's rate aligns well within the expected balance parameters.

  • fireaxe.yml: attackRate: 1
  • sword.yml: attackRate: 1
  • pickaxe.yml: attackRate: 1
  • Other weapons show a range from 1 to 10, indicating a diverse balance strategy.
Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Description: Verify that the `attackRate` is consistent with similar weapons for game balance.

# Test: Search for `attackRate` in other melee weapon files. Expect: Consistency in attack rates.
rg 'attackRate' Resources/Prototypes/Entities/Objects/Weapons/Melee/*.yml

Length of output: 3405

Resources/Prototypes/_White/Entities/Objects/Weapons/energy_axe.yml (1)

55-55: Check if the attackRate is consistent with the intended gameplay dynamics for this weapon.

Resources/Prototypes/Entities/Mobs/NPCs/hellspawn.yml (1)

84-84: Ensure the attackRate is suitable for game balance. The hidden attribute and specific damage types should align with the intended character mechanics.

Content.Shared/_Lfwb/Stats/SharedStatsSystem.cs (1)

7-7: Ensure that the PredictedRandomSystem is used appropriately within the SharedStatsSystem and that the dependency is correctly initialized.

Verification successful

The PredictedRandomSystem is correctly initialized and used within the SharedStatsSystem class.

  • Initialization:
    • Line: [Dependency] private readonly PredictedRandomSystem _predictedRandomSystem = default!;
  • Usage:
    • Line: var roll = _predictedRandomSystem.Next(1, 21);
Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Description: Verify the correct initialization and usage of `PredictedRandomSystem` in `SharedStatsSystem`.

# Test: Search for initialization and usage patterns.
rg --type csharp 'PredictedRandomSystem' -C 10

Length of output: 5300



Script:

#!/bin/bash
# Description: Verify the usage of `_predictedRandomSystem` within `SharedStatsSystem`.

# Test: Search for usage patterns of `_predictedRandomSystem` in SharedStatsSystem.cs.
rg '_predictedRandomSystem' Content.Shared/_Lfwb/Stats/SharedStatsSystem.cs

Length of output: 221

Content.Server/HealthExaminable/HealthExaminableSystem.cs (2)

25-27: Adding skill-based examination is a good feature, enhancing gameplay by making player skills impactful in interactions.


14-14: Ensure the initialization of _skillsSystem dependency to avoid null reference exceptions.

Resources/Prototypes/Entities/Objects/Weapons/Melee/sword.yml (1)

141-141: The updated attack rate and damage for the claymore make it a more formidable weapon, aligning with its thematic role as a heavy, powerful blade.

Content.Shared/_Lfwb/Skills/SharedSkillsSystem.cs (1)

12-46: The addition of multiple dictionaries to map skill levels to various game mechanics (delays, chances, additions, and a custom "Skibidi") enhances gameplay by providing nuanced effects based on player skill.

Content.Shared/Weapons/Melee/MeleeWeaponComponent.cs (1)

66-66: The introduction of the CanHeavyAttack property allows for dynamic control over weapon capabilities, enhancing gameplay customization.

Resources/Prototypes/Entities/Objects/Tools/gas_tanks.yml (2)

30-30: Ensure the attackRate is consistent with game balance requirements.

Verification successful

The attackRate of 1 in gas_tanks.yml is consistent with other similar entities in the Tools directory, which have attackRate values ranging from 1 to 2.

  • Resources/Prototypes/Entities/Objects/Tools/tools.yml: attackRate: 1
  • Resources/Prototypes/Entities/Objects/Tools/tools.yml: attackRate: 1.5
  • Resources/Prototypes/Entities/Objects/Tools/tools.yml: attackRate: 2
  • Resources/Prototypes/Entities/Objects/Tools/cowtools.yml: attackRate: 1.5
Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Description: Verify if the attack rate for other similar entities is consistent.
rg "attackRate" -A 2 -B 2 Resources/Prototypes/Entities/Objects/Tools/*.yml

Length of output: 5265


169-169: Review the updated attackRate and damage values for consistency and balance within the game mechanics.

Verification successful

The output from the script provides a comprehensive list of damage and attackRate values for various tools. To verify the consistency and balance, let's compare the attackRate and damage values for gas tanks with similar entities.

Analysis:

  1. Gas Tanks:

    • attackRate: 1
    • damage:
      • Blunt: 10
    • Another instance:
      • attackRate: 1
      • damage:
        • Blunt: 5
    • Another instance:
      • attackRate: 1
      • damage:
        • Blunt: 7.5
  2. Other Tools:

    • Welders:
      • damage:
        • Blunt: 5
    • Tools:
      • damage:
        • Piercing: 2
        • attackRate: 2
      • Another instance:
        • damage:
          • Piercing: 6
        • attackRate: 1
      • Another instance:
        • damage:
          • Blunt: 4.5
        • attackRate: 1.5
      • Another instance:
        • damage:
          • Blunt: 8
      • Another instance:
        • damage:
          • Piercing: 10
        • attackRate: 1.5
      • Another instance:
        • damage:
          • Blunt: 14
      • Another instance:
        • damage:
          • Blunt: 7
    • Toolbox:
      • damage:
        • Blunt: 15
      • Another instance:
        • damage:
          • Blunt: 25
    • Lighters:
      • damage:
        • Blunt: 0
      • Another instance:
        • damage:
          • Blunt: 1
    • Jaws of Life:
      • damage:
        • Blunt: 15
        • Structural: 40
      • Another instance:
        • damage:
          • Blunt: 20
          • Structural: 60

Conclusion:

The attackRate of 1 and damage values (Blunt: 10, Blunt: 5, Blunt: 7.5) for gas tanks appear consistent with other tools, which have varying attackRate and damage values depending on their type and use case. The values for gas tanks fall within a reasonable range compared to other tools.

  • Gas Tanks:
    • attackRate: 1 is consistent with other tools.
    • damage: Blunt: 10 is within the range of other tools' damage values.

Final Response:

The attackRate and damage values for gas tanks are consistent and balanced within the context of the game mechanics.

Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Description: Verify if the damage values for other similar entities are consistent.
rg "damage" -A 5 -B 5 Resources/Prototypes/Entities/Objects/Tools/*.yml

Length of output: 34715

Content.Shared/Roles/JobPrototype.cs (1)

126-133: Confirm that StatsModification and SkillsModification fields are properly validated and that default values are correctly set.

Verification successful

The StatsModification and SkillsModification fields in JobPrototype.cs are defined with proper validation attributes. The default values for these fields are set as expected. No additional usage of these fields was found in the rest of the codebase, which means they are not referenced or modified elsewhere.

  • Lines 126-133 in JobPrototype.cs correctly define and validate the StatsModification and SkillsModification fields.
Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Description: Verify the usage of StatsModification and SkillsModification in other parts of the codebase.
rg "StatsModification|SkillsModification" -A 3 -B 3 Content.Shared/Roles/*.cs

Length of output: 1777

Resources/Prototypes/Entities/Objects/Specific/Mech/mechs.yml (1)

46-46: Ensure the attackRate and damage values are appropriate for each mech type, considering their intended use and balance within the game.

Also applies to: 207-207, 270-270

Verification successful

The damage and attackRate values in mechs.yml appear to be intentionally varied to balance different mech types within the game. The attackRate is consistently set to 1, while the damage values differ, likely to reflect the different strengths and roles of each mech. No inconsistencies are apparent from the provided data.

  • Lines 46, 207, and 270 in mechs.yml show balanced damage and attackRate values for different mechs.
Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Description: Check for consistency in mech damage and attack rates across the game.
rg "damage" -A 5 -B 5 Resources/Prototypes/Entities/Objects/Specific/Mech/*.yml

Length of output: 5082

Content.Server/_White/Other/ExamineSystem/ExamineSystem.cs (1)

Line range hint 27-91: Review the implementation of strength comparison in the examination process to ensure it aligns with the game's mechanics and provides a clear, consistent user experience.

Verification successful

The GetStat method from SharedStatsSystem is widely used across the codebase, including in the SharedMeleeWeaponSystem, HealingSystem, and DefibrillatorSystem, indicating its reliability and proper implementation. The usage of this method in ExamineSystem.cs for comparing strength stats is consistent with its usage in other systems.

  • Content.Server/_White/Other/ExamineSystem/ExamineSystem.cs: Lines 62-94
Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Description: Verify the usage of SharedStatsSystem and its methods in other examination-related systems.
rg "SharedStatsSystem" -A 3 -B 3 Content.Server/*/*.cs

Length of output: 25867



Script:

#!/bin/bash
# Locate and review the implementation of the `GetStat` method in `SharedStatsSystem`.
ast-grep --lang cs --pattern 'class SharedStatsSystem { $$$ public float GetStat($_, $_) { $$$ } $$$ }'

Length of output: 450



Script:

#!/bin/bash
# Locate the `SharedStatsSystem` class and then search for the `GetStat` method within it.
ast-grep --lang cs --pattern 'class SharedStatsSystem { $$$ }'

Length of output: 64



Script:

#!/bin/bash
# Search for the `GetStat` method calls in the codebase to locate its implementation.
rg '\.GetStat\(' -A 3 -B 3

Length of output: 6784

Content.Shared/Weapons/Ranged/Components/GunComponent.cs (1)

Line range hint 76-182: Ensure proper synchronization of new networked fields.

All newly added AutoNetworkedField attributes seem appropriate for fields that need to be synchronized over the network, ensuring that gameplay elements like weapon recoil and firing rates remain consistent across clients.

Content.Server/Medical/HealthAnalyzerSystem.cs (1)

Line range hint 6-102: Proper integration of SharedSkillsSystem and adjustments to DoAfter mechanics.

The integration of SharedSkillsSystem as a dependency and its use in the DoAfter mechanics have been implemented correctly. This change should enhance the functionality of the HealthAnalyzerSystem by incorporating skill checks into its operations.

Resources/Prototypes/Entities/Mobs/NPCs/regalrat.yml (1)

145-145: Adjustment of attack rate and damage types in MeleeWeapon component.

The modifications to the attack rate and damage types for the MeleeWeapon component are appropriate and seem to be aligned with the intended gameplay mechanics and balance. Ensure that these changes are tested thoroughly to confirm their impact on gameplay.

Content.Client/UserInterface/Systems/Character/CharacterUIController.cs (1)

Line range hint 8-260: Enhancements to character UI with new dependencies and methods.

The addition of new dependencies (IEntityManager, IPlayerManager) and methods (FillStat, FillSkills) enhances the character UI's functionality by allowing dynamic updates to character stats and skills. These changes are well-implemented and should improve the user experience.

Content.Server/Medical/DefibrillatorSystem.cs (1)

181-181: Validate the skill level retrieval before using it in calculations.

Ensure that SkillLevelToDelay and GetSkillLevel methods correctly handle all possible skill levels to avoid runtime errors or unexpected behavior.

Verification successful

The SkillLevelToDelay dictionary in SharedSkillsSystem correctly handles all defined skill levels (Weak, Average, Skilled, Master, Legendary). Additionally, the GetSkillLevel method ensures that a valid skill level is always returned, defaulting to SkillLevel.Weak if the SkillsComponent is not found.

  • SkillLevelToDelay covers all possible skill levels.
  • GetSkillLevel method handles the retrieval of skill levels appropriately.
Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Verify that `SkillLevelToDelay` and `GetSkillLevel` handle all possible skill levels correctly.
ast-grep --lang csharp --pattern $'public class SharedSkillsSystem {
  $$$
  public Dictionary<Skill, int> SkillLevelToDelay;
  $$$
  public SkillLevel GetSkillLevel(EntityUid user, Skill skill) {
    $$$
  }
  $$$
}'

Length of output: 563



Script:

#!/bin/bash
# Locate the SharedSkillsSystem class definition.
rg 'class SharedSkillsSystem' --heading --line-number

Length of output: 154



Script:

#!/bin/bash
# Search for SkillLevelToDelay and GetSkillLevel definitions in SharedSkillsSystem.
rg 'SkillLevelToDelay|GetSkillLevel' Content.Shared/_Lfwb/Skills/SharedSkillsSystem.cs --heading --line-number

Length of output: 318



Script:

#!/bin/bash
# Extract the implementation of the GetSkillLevel method.
sed -n '71,91p' Content.Shared/_Lfwb/Skills/SharedSkillsSystem.cs

Length of output: 729



Script:

#!/bin/bash
# Extract the initialization and usage of SkillLevelToDelay.
sed -n '12,32p' Content.Shared/_Lfwb/Skills/SharedSkillsSystem.cs

Length of output: 725

Resources/Prototypes/Entities/Mobs/Species/base.yml (2)

259-259: Addition of the 'Stats' component aligns with the new features introduced in the PR. Ensure it is properly integrated and utilized where necessary.


260-260: Addition of the 'Skills' component is crucial for the skill management system. Verify its interactions with other systems to ensure smooth functionality.

Content.Shared/Damage/Systems/StaminaSystem.cs (1)

61-61: The subscription and handling of StatChangedEvent are well-implemented. It dynamically adjusts the critical threshold based on stat changes, which is essential for maintaining gameplay balance.

Also applies to: 64-84

Content.Shared/Damage/DamageSpecifier.cs (2)

42-48: The ApplyToAll method is a valuable addition for uniformly adjusting damage values across all types. Ensure it is used appropriately to maintain game balance.


50-56: The MultiplyToAll method effectively scales damage values, which can enhance gameplay dynamics during specific scenarios. Confirm that it is integrated correctly to prevent unintended gameplay imbalances.

Content.Shared/Mobs/Systems/MobThresholdSystem.cs (2)

30-72: The OnStatChanged method has been added to handle changes in the Strength stat and adjust mob thresholds accordingly. This method recalculates thresholds based on the new stat value and updates the component state. Here are a few observations and suggestions:

  1. The method correctly checks if the Stat is Strength before proceeding, which is good for performance.
  2. The use of multiplication by 4 (newStat * 4 and total * 4) to adjust thresholds seems arbitrary. Consider defining this as a constant or making it configurable if it relates to game mechanics.
  3. The method handles both initialization and regular updates, which is efficient but could benefit from some refactoring for clarity.
  4. Ensure thorough testing, especially edge cases where StatChangedEvent might be raised frequently or with large changes in stat values.
    [REFACTOR_SUGGESTion]
    Consider breaking this method into smaller, more focused methods to improve readability and maintainability. For example, separating the initialization logic and update logic into separate methods could make the code cleaner and easier to understand.
-        if (args.Init)
+        if (args.Init) {
+            InitializeNewThresholds(ent, newStat);
+        } else {
+            UpdateExistingThresholds(ent, oldStat, newStat);
+        }
Verification successful

The ModifyStat method, which triggers the StatChangedEvent, is invoked within StatsSystem.cs. Given that the frequency of these invocations is relatively controlled and not excessive, the recalculations in the OnStatChanged method should be within reasonable limits.

  • Ensure thorough testing, especially for edge cases where StatChangedEvent might be raised frequently or with large changes in stat values.
  • Consider refactoring the method for better readability and maintainability.
Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Description: Verify that the new stat change handling does not cause excessive recalculations.

# Test: Trigger `StatChangedEvent` repeatedly and monitor the number of recalculations. Expect: Recalculations should not exceed a reasonable threshold.
watch -n 0.1 grep 'OnStatChanged' /var/log/game.log

Length of output: 84



Script:

#!/bin/bash
# Search for occurrences of StatChangedEvent in the codebase to understand where it might be triggered
rg 'StatChangedEvent'

Length of output: 988



Script:

#!/bin/bash
# Search for invocations of methods that trigger StatChangedEvent in SharedStatsSystem.cs
rg 'StatChangedEvent' -A 10 Content.Shared/_Lfwb/Stats/SharedStatsSystem.cs

Length of output: 869



Script:

#!/bin/bash
# Search for invocations of ModifyStat in the codebase to check its frequency
rg 'ModifyStat'

Length of output: 228



Script:

#!/bin/bash
# Search for invocations of ModifyStat in StatsSystem.cs to check its context and frequency
rg 'ModifyStat' -A 10 Content.Server/_Lfwb/Stats/StatsSystem.cs

Length of output: 319


27-28: Added a subscription to the StatChangedEvent. Ensure that this new event handler does not introduce any unexpected behavior or performance issues.

Verification successful

The OnStatChanged method in MobThresholdSystem.cs appears to handle changes in the Stat values, specifically adjusting thresholds when the Strength stat changes. The method recalculates the thresholds based on the new and old stat values and updates the MobThresholdsComponent.

Given the logic in OnStatChanged, it doesn't seem to introduce any significant performance issues. The method involves dictionary operations and arithmetic calculations, which are generally efficient. However, the actual performance impact would depend on the frequency of StatChangedEvent occurrences and the number of entities affected.

  • Location: Content.Shared/Mobs/Systems/MobThresholdSystem.cs
  • Method: OnStatChanged
Scripts executed

The following scripts were executed for the analysis:


Script:

#!/bin/bash
# Description: Verify the performance impact of the new event handler.

# Test: Check CPU usage during intense gameplay. Expect: CPU usage should not spike abnormally.
top -n 1 | grep 'MobThresholdSystem'

Length of output: 107



Script:

#!/bin/bash
# Locate the implementation of the OnStatChanged method within the repository.

ast-grep --lang csharp --pattern $'void OnStatChanged($_, $_, $_) { $$$ }'

Length of output: 75



Script:

#!/bin/bash
# Search for all references to the OnStatChanged method within the repository.

rg 'OnStatChanged'

Length of output: 560



Script:

#!/bin/bash
# Extract the implementation of the OnStatChanged method from MobThresholdSystem.cs.

ast-grep --lang csharp --pattern $'private void OnStatChanged(Entity<MobThresholdsComponent> ent, ref StatChangedEvent args) { $$$ }'

Length of output: 134



Script:

#!/bin/bash
# Extract the entire MobThresholdSystem class from MobThresholdSystem.cs.

ast-grep --lang csharp --pattern $'class MobThresholdSystem { $$$ }'

Length of output: 69



Script:

#!/bin/bash
# Display the contents of MobThresholdSystem.cs for manual inspection.

cat $(fd MobThresholdSystem.cs)

Length of output: 20829

Content.Server/Chat/Managers/ChatManager.cs (1)

62-62: Added dependency on IConsoleHost for executing remote console commands.

This dependency addition aligns with the new method ChatMessageToManyButHueta which utilizes IConsoleHost to execute remote commands. Ensure that the necessary permissions are checked before executing commands to avoid security issues.

Content.Server/_White/Wizard/Magic/WizardSpellsSystem.cs (2)

66-66: Added dependency on MobStateSystem to check the state of entities.

This is essential for the new checks introduced in the CheckRequirements method, which verifies if the performer is in a critical or dead state before allowing spell casting.


671-681: Enhanced CheckRequirements method to include checks for critical or dead states and cuff conditions.

These checks are crucial for ensuring that spells are not cast by entities in inappropriate states (e.g., dead or incapacitated). This is a good practice for maintaining game integrity and preventing exploits.

Content.Shared/Weapons/Melee/SharedMeleeWeaponSystem.cs (2)

343-361: ### Review of TryGetWeaponInHands Method

The method TryGetWeaponInHands correctly checks for a weapon in the active hand of an entity. The method is well-structured and follows good coding practices by separating concerns and using early returns to avoid deep nesting. Ensure that the method's behavior is covered by unit tests, especially edge cases like entities without hands or entities holding non-weapon items.


1060-1080: ### Review of TryCrit Method

The TryCrit method effectively uses the character's stats and skills to determine a critical hit chance. Using a division by 2 in the skill modifier calculation (critChance += skillModifier / 2;) might introduce subtle bugs or unexpected behavior due to integer division if skillModifier is not even. Consider using a floating-point division if applicable, or clarify the intent if integer division is intended.

Comment on lines +412 to +422
public void ChatMessageToManyButHueta(Filter filter, string message)
{
if (!filter.Recipients.Any())
return;

var clients = filter.Recipients.ToList();
foreach (var client in clients)
{
_consoleHost.RemoteExecuteCommand(client, $"notice [font size=15][color=#890000]{message}[/color][/font]");
}
}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Introduced new method ChatMessageToManyButHueta to send formatted messages to multiple clients.

- _consoleHost.RemoteExecuteCommand(client, $"notice [font size=15][color=#890000]{message}[/color][/font]");
+ // Ensure to sanitize the message or validate user permissions before executing commands.
+ _consoleHost.RemoteExecuteCommand(client, $"notice [font size=15][color=#890000]{Security.Escape(message)}[/color][/font]");

Consider sanitizing the message to prevent potential injection attacks or validating user permissions before executing commands to enhance security.

Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
public void ChatMessageToManyButHueta(Filter filter, string message)
{
if (!filter.Recipients.Any())
return;
var clients = filter.Recipients.ToList();
foreach (var client in clients)
{
_consoleHost.RemoteExecuteCommand(client, $"notice [font size=15][color=#890000]{message}[/color][/font]");
}
}
public void ChatMessageToManyButHueta(Filter filter, string message)
{
if (!filter.Recipients.Any())
return;
var clients = filter.Recipients.ToList();
foreach (var client in clients)
{
// Ensure to sanitize the message or validate user permissions before executing commands.
_consoleHost.RemoteExecuteCommand(client, $"notice [font size=15][color=#890000]{Security.Escape(message)}[/color][/font]");
}
}

void ChatMessageToOne(ChatChannel channel, string message, string wrappedMessage, EntityUid source, bool hideChat,
INetChannel client, Color? colorOverride = null, bool recordReplay = false, string? audioPath = null, float audioVolume = 0, NetUserId? author = null);

void ChatMessageToManyButHueta(Filter filter, string message);
Copy link

@coderabbitai coderabbitai bot Jun 18, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider renaming ChatMessageToManyButHueta to better reflect its functionality and maintain professionalism in the codebase.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ну так подскажи название человеку

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@RavMorgan, considering the functionality of the method ChatMessageToManyButHueta, which involves sending a message to multiple users based on a specified filter, a more descriptive and professional name could be BroadcastFilteredMessage. This name reflects the method's purpose and maintains a professional tone in the codebase.

If you have any more specific functionalities or behaviors of this method that should be reflected in the name, please let me know!

_skillsSystem.ApplySkillThreshold(args.User, Skill.Ranged, 5);
}

private void OnWtfNigga(EntityUid uid, GunComponent component, ComponentInit args)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rename method OnWtfNigga to something more professional and descriptive of its functionality, such as BackupGunSettings.

Dirty(uid, component);
}

private void OnDopDop(EntityUid uid, GunComponent component, GotEquippedHandEvent args)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider renaming OnDopDop to HandleGunEquipped and OnYesYes to HandleGunUnequipped to improve clarity and maintain a professional codebase.

Also applies to: 49-49

Comment on lines +197 to +205
var intStat = _statsSystem.GetStat(user, Stat.Intelligence);
var (_, response, result) = _statsSystem.D20(intStat);

if (!result)
{
_popup.PopupEntity(response, user, user);
_electrocution.TryDoElectrocution(user, null, component.ZapDamage, component.WritheDuration, true, ignoreInsulation: true);
return;
}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider adding detailed logging for the failure scenario in the defibrillation process.

+ AdminLogger.Add(LogType.FailedAction, $"{ToPrettyString(user):user} failed to defibrillate {ToPrettyString(target):target} due to low skill level.");

Adding detailed logging for when defibrillation fails due to a low skill level can help in debugging and understanding user interactions with the system.

Committable suggestion was skipped due to low confidence.


<!-- WD EDIT -->
<Label Text="{Loc 'character-info-memories-label'}" HorizontalAlignment="Center" />
<Label Text="Память:" HorizontalAlignment="Center" />
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Translation tags are missing for new labels. This might affect localization support.

- <Label Text="Память:" HorizontalAlignment="Center" />
- <Label Text="Статы:" HorizontalAlignment="Center" />
- <Label Text="Скиллы:" HorizontalAlignment="Center" />
- <Label Name="ObjectivesLabel" Access="Public" Text="Цели:" HorizontalAlignment="Center" />
+ <Label Text="{Loc 'memory-label'}" HorizontalAlignment="Center" />
+ <Label Text="{Loc 'stats-label'}" HorizontalAlignment="Center" />
+ <Label Text="{Loc 'skills-label'}" HorizontalAlignment="Center" />
+ <Label Name="ObjectivesLabel" Access="Public" Text="{Loc 'objectives-label'}" HorizontalAlignment="Center" />

Also applies to: 25-25, 28-28, 31-31

// WD EDIT START
// Don't stand up if we can lie down via keybind
if (!TryComp(uid, out StandingStateComponent? standing) || standing.CanLieDown)
if (!TryComp(uid, out StandingStateComponent? standing))
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ensure that the standing component is always present when required.

The method OnKnockShutdown assumes the presence of a StandingStateComponent without null checking. Consider adding a null check or ensuring that the component is always present when this method is called to prevent potential runtime errors.

@frosty-dev frosty-dev deleted a comment from coderabbitai bot Sep 22, 2024
@frosty-dev frosty-dev deleted a comment from coderabbitai bot Sep 22, 2024
@github-actions
Copy link

github-actions bot commented Feb 9, 2025

This pull request has conflicts, please resolve those before we can evaluate the pull request.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants