This repo must never contain secrets or private keys. This includes, but is not limited to:
- Apple/Google certs & provisioning profiles (
*.p12,*.mobileprovision,*.cer,*.csr,*.p8) - API keys, tokens, OAuth secrets, or private keys of any kind
.envfiles or any environment files containing secrets- Service account files or credentials (Firebase, GCP, AWS, etc.)
- Do not commit secrets — ever. If a secret appears in git history, rotate it immediately.
- Never upload keys to GitHub. Use CI secrets or encrypted storage.
- Always scan before commit or PR (see secret scanning below).
This repo uses gitleaks to prevent accidental secret leaks. You must:
- Run secret scan locally before committing if you are making release/infra changes.
- Ensure CI passes the gitleaks check on every PR.
If you see a gitleaks failure, do not bypass it — fix it or rotate the secret.
- Revoke/rotate the key immediately.
- Remove it from the repo (rewrite history if required).
- Re-run secret scan and verify clean.
This policy is mandatory for all human and automated agents.