Add defensive .gitignore patterns for secrets/keys

Blocks .env, *.key, *.pem, id_rsa*, secrets.*, credentials.json, etc.
Preventive — no exposure found; future commits can't accidentally
leak these.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
cproudlock
2026-04-17 12:50:09 -04:00
parent eefd7c4554
commit ca22d62a2a

19
.gitignore vendored
View File

@@ -56,3 +56,22 @@ Thumbs.db
node_modules/ node_modules/
frontend/dist/ frontend/dist/
*.local *.local
# Secrets and credentials (defensive)
.env
.env.*
!.env.example
!.env.*.example
*.pem
*.key
id_rsa
id_rsa.*
*.ppk
*.p12
*.pfx
secrets.json
secrets.yaml
secrets.yml
*_secret
*_secrets
credentials.json