Add defensive .gitignore patterns for secrets/keys
Blocks .env, *.key, *.pem, id_rsa*, secrets.*, credentials.json, etc. Preventive — no exposure found; future commits can't accidentally leak these. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
19
.gitignore
vendored
19
.gitignore
vendored
@@ -40,3 +40,22 @@ Thumbs.db
|
||||
|
||||
# Local config
|
||||
config.local.py
|
||||
|
||||
# Secrets and credentials (defensive)
|
||||
.env
|
||||
.env.*
|
||||
!.env.example
|
||||
!.env.*.example
|
||||
*.pem
|
||||
*.key
|
||||
id_rsa
|
||||
id_rsa.*
|
||||
*.ppk
|
||||
*.p12
|
||||
*.pfx
|
||||
secrets.json
|
||||
secrets.yaml
|
||||
secrets.yml
|
||||
*_secret
|
||||
*_secrets
|
||||
credentials.json
|
||||
|
||||
Reference in New Issue
Block a user