This project contains several types of sensitive information that should NEVER be shared publicly or committed to a public repository:
- Gemini API keys
- WhatsApp authentication tokens
- Any other third-party API keys
.envfiles containing environment variablesconfig.jsonfiles with API keys or sensitive settings- Any file containing passwords, tokens, or secrets
- Contact information
- Chat histories
- Message logs
- User credentials
- WhatsApp session files in
backend/sessions/ - Authentication tokens
- Login cookies
The project includes a comprehensive .gitignore file that prevents sensitive files from being committed. Make sure it's properly configured and working by checking:
git status- Store sensitive information in
.envfiles - Never commit
.envfiles to the repository - Use
.env.examplefiles as templates without real credentials
- Use
.exampleversions of configuration files - Document required fields without including actual values
- Instruct users to copy and configure these files locally
Always check the following before committing code:
- Run
git statusto see what files will be committed - Check for any sensitive files that might have been missed by
.gitignore - Review changes with
git diff --stagedto ensure no secrets are included - Consider using a pre-commit hook to prevent accidental commits of sensitive data
If you discover a security vulnerability or notice that sensitive information has been committed to the repository:
- Do not create a public issue
- Immediately remove the sensitive information if possible
- Consider rotating any exposed credentials
- Contact the repository owner directly
- Regularly audit your repository for sensitive information
- Use environment variables for all secrets
- Consider using a secrets management solution for production deployments
- Rotate credentials regularly, especially if there's any suspicion they might have been exposed