Leaked Secret Detected
PKGuardian detected what appears to be a EVM Private Key (0x) in a recent commit.
| Field |
Value |
| Commit |
fb8d6e8047df0672b87e6f10de9fa2d7b0672d2d |
| File |
cb_monitor_state.json |
| Secret (redacted) |
9212f6e4a4eb1acf775f44f1c075969ea966580dcc3e6f4f6c3a0c886c48cf2d |
What to do
- Rotate the key immediately. Even if you remove the commit, it may already be cached by bots.
- Revoke the old key in the corresponding service.
- Consider using a
.gitignore or a secrets manager to prevent future leaks.
- Use
git filter-repo or BFG to scrub the key from history if needed.
This issue was opened automatically by PKGuardian - a public GitHub push secret scanner.
If this is a false positive, feel free to close this issue.
Leaked Secret Detected
PKGuardian detected what appears to be a EVM Private Key (0x) in a recent commit.
fb8d6e8047df0672b87e6f10de9fa2d7b0672d2dcb_monitor_state.json9212f6e4a4eb1acf775f44f1c075969ea966580dcc3e6f4f6c3a0c886c48cf2dWhat to do
.gitignoreor a secrets manager to prevent future leaks.git filter-repoor BFG to scrub the key from history if needed.This issue was opened automatically by PKGuardian - a public GitHub push secret scanner.
If this is a false positive, feel free to close this issue.