Recently, a developer accidentally made a private repository public, which contained secret keys. Although a third-party application promptly flagged and rotated the exposed credentials, the repository remained public for some time, raising concerns about potential unauthorized access and misuse of the sensitive code.
Developers require access to perform their duties, yet we need to ensure such critical mistakes are minimized.
What are the best practices and strategies to prevent such incidents in the future?
How can we better monitor and control repository visibility settings to safeguard sensitive contents?