-
-
Notifications
You must be signed in to change notification settings - Fork 582
main-to-dev #998
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
main-to-dev #998
Conversation
bump: 0.4.0
Co-authored-by: Jonghakseo <[email protected]>
Co-authored-by: Jonghakseo <[email protected]>
Co-authored-by: Jonghakseo <[email protected]>
Co-authored-by: Jonghakseo <[email protected]>
Co-authored-by: Jonghakseo <[email protected]>
Co-authored-by: Jonghakseo <[email protected]>
fix/merge part of #910
chore: update readme and bug report to mention brie
|
GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
---|---|---|---|---|---|
17034608 | Triggered | Generic Password | f95d3b0 | pnpm-lock.yaml | View secret |
15633129 | Triggered | Generic Password | a145a2b | pnpm-lock.yaml | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secrets safely. Learn here the best practices.
- Revoke and rotate these secrets.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
9fe29c1
to
6841da9
Compare
Co-authored-by: Jonghakseo <[email protected]> Co-authored-by: JongHak Seo <[email protected]> Co-authored-by: Ahmet Burak <[email protected]> Co-authored-by: Karan Chaudhary <[email protected]> Co-authored-by: jimmy.pan <[email protected]>
* fix: simplify ChoicesType * feat: create module structure for `module-manager` folder * fix: run `pnpm i` * fix: add omitting tests for packing and unpacking if not exists * feat: move all path const to paths.ts
… content-ui scripts (#846) Co-authored-by: Jonghakseo <[email protected]>
Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
9fa161d
to
8f94f75
Compare
CI errors was falsy, because pnpm-lock.yml is up to date. |
Co-authored-by: Jonghakseo <[email protected]> Co-authored-by: JongHak Seo <[email protected]> Co-authored-by: Ahmet Burak <[email protected]> Co-authored-by: Karan Chaudhary <[email protected]> Co-authored-by: jimmy.pan <[email protected]> Co-authored-by: Ion Leu <[email protected]> Co-authored-by: Weilue Luo <[email protected]> Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com> Co-authored-by: Rasul <[email protected]>
Priority*
Purpose of the PR*
I want to resolve conflicts between
dev
andmain
branches.Created
secret_scanning.yml
for gitguardian ignoringChanges*
I've rebased
dev
ontomain
How to check the feature
Run
pnpm dev
orpnpm build
and check if everything works.