-
Notifications
You must be signed in to change notification settings - Fork 4
Merge with main branch #62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
feat(core): initialize Android project with MVVM and Firebase
chore(config): add Firebase configuration and gitignore
chore(test): testing
test(profile): add TestFile.java for test commit
Fix: Add dummy google-services.json for CI and suppress compileSdk wa…
- Add email/password authentication - Implement user data storage in Firestore - Add profile picture storage in Firebase Storage - Create login and signup UI - Add password reset and email verification features
fix(auth): correct import paths for activities
feat(ui): redesign login and signup screens with dark theme
feat(home): push post on feed
feat(home): clean test button and add delete post function
feat(feed): add delete post feature
fix: clean up some code
fix: errors
fix bugs related to aspect ratio error
docs(readme): adjust readme
feat(profile): add profile avatar
design: app icon
fix: complete and clean up code
feat(README): edit README file
|
| GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
|---|---|---|---|---|---|
| - | - | Cloudinary API keys | c3fdbc8 | app/src/main/java/com/pineapple/capture/utils/CloudinaryManager.java | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secret safely. Learn here the best practices.
- Revoke and rotate this secret.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
Pull Request
Description
Related Issues
Type of Change
How Has This Been Tested?
Checklist: