-
Notifications
You must be signed in to change notification settings - Fork 0
Update git.ts #3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❌ Jit has detected 100 important findings in this PR that you should review.
The first 10 findings are detailed below as separate comments.
Click here to view all the findings on Jit.
It’s highly recommended that you fix these security issues before merging.
Alternatively, comment #jit_ignore_all in this PR to ignore all findings. Admin privileges required.
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❌ Jit has detected 1000 important findings in this PR that you should review.
The first 10 findings are detailed below as separate comments.
Click here to view all the findings on Jit.
It’s highly recommended that you fix these security issues before merging.
Alternatively, comment #jit_ignore_all in this PR to ignore all findings. Admin privileges required.
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❌ The following Jit checks failed to run:
- secret-detection
#jit_bypass_commit in this PR to bypass, Jit Admin privileges required.
More info in the Jit platform.
No description provided.