DEV Community

Discussion on: Removing Sensitive Data From Git History

Collapse
 
downey profile image
Tim Downey • Edited

+1

Once a secret is leaked publicly, consider it compromised and rotate it!

Bots are constantly watching Github for leaked public credentials and will find them before you can remove them.

If it wasn't pushed publicly, though, this seems like a good way of cleaning up.