Just change the keys if you've exposed a private key. As a general rule, never commit a private key on a public repository and really it's best to not ever and use something more secure like Hashicorp Vault or AWS's tools for secrets.
Comment hidden by post author - thread only visible in this permalink
you are 14? really?
btw, be careful on how you remove those private keys. one commit removing the files is not enough
Just change the keys if you've exposed a private key. As a general rule, never commit a private key on a public repository and really it's best to not ever and use something more secure like Hashicorp Vault or AWS's tools for secrets.
To OP: See this for GitHub's official guide about removing sensitive data: docs.github.com/en/authentication/...