Company
Date Published
Author
Simon Maple
Word count
315
Language
English
Hacker News points
None

Summary

Never store credentials as code/config in Azure Repos` There are great tools available to statically analyze commits for sensitive information, such as git-secrets and CredScan, which can reject pushes with passwords or sensitive data and detect credentials introduced into pull requests. Having team-wide rules to prevent storing credentials as code is also effective, while using secure variable storage like Azure KeyVault and regularly auditing repositories with tools like GitRob or truffleHog can help avoid accidentally introducing sensitive information.