gotchaCritical
Environment secrets exposed in client bundle or git history
Viewed 0 times
API key exposedsecret in gitclient bundlegitleakssecret scanningrotate secrets
browserci-cdterminal
Error Messages
Problem
API keys, database passwords, or other secrets accidentally included in client-side JavaScript bundle or committed to git.
Solution
Prevention: (1) Use .env files with proper prefixes — only prefix TRULY public values. (2) Add .env* to .gitignore BEFORE first commit. If already committed: rotate ALL exposed secrets, then use git-filter-repo. (3) Use secret scanning: GitHub secret scanning, gitleaks, or trufflehog. (4) Server-side: use secret managers in production. (5) CI: use provider's secret storage, never hardcode.
Why
Git stores complete history. Even deleted secrets persist in old commits. Client bundles are fully readable in browser DevTools. Once exposed, assume compromised.
Revisions (0)
No revisions yet.