Just change the keys if you've exposed a private key. As a general rule, never commit a private key on a public repository and really it's best to not ever and use something more secure like Hashicorp Vault or AWS's tools for secrets.
Comment hidden by post author - thread only visible in this permalink
Just change the keys if you've exposed a private key. As a general rule, never commit a private key on a public repository and really it's best to not ever and use something more secure like Hashicorp Vault or AWS's tools for secrets.
To OP: See this for GitHub's official guide about removing sensitive data: docs.github.com/en/authentication/...