Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I agree with ajsharp, this is completely avoidable.

Along with never committing secrets to source control, implementing 3rd party data breach and data leak monitoring is necessary as recommended in NIST 800-63B



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: