When you accidentally share your secrets with the Internet
Published May 08, 2019
Version 1.0Was this article helpful?
Here are some related links from AWS and Github on this:
https://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.html
https://aws.amazon.com/blogs/security/what-to-do-if-you-inadvertently-expose-an-aws-access-key/
https://help.github.com/en/github/authenticating-to-github/removing-sensitive-data-from-a-repository
If you commit sensitive data, such as a password or SSH key into a Git repository, you can remove it from the history. To entirely remove unwanted files from a repository's history you can use either the git filter-branch command or the BFG Repo-Cleaner open source tool.