Just change the keys if you've exposed a private key. As a general rule, never commit a private key on a public repository and really it's best to not ever and use something more secure like Hashicorp Vault or AWS's tools for secrets.
Comment hidden by post author - thread only visible in this permalink
Thanks :)
For your first question, I had the mistake of adding my github's account private key to the repository source.
now I remove them all.
I'm glad about that :)
I had no idea what vanilla meant 😅(of course, now I know).
you are 14? really?
btw, be careful on how you remove those private keys. one commit removing the files is not enough
Just change the keys if you've exposed a private key. As a general rule, never commit a private key on a public repository and really it's best to not ever and use something more secure like Hashicorp Vault or AWS's tools for secrets.
To OP: See this for GitHub's official guide about removing sensitive data: docs.github.com/en/authentication/...