As a Project Architect
I want to ensure that we have measures in place to prevent the committing of secrets to the code base
In order to prevent them being used by unintended users given all repos are public
Note. This builds on an early Spike in the project which is implemented in the CentOps repo currently. A Git hook is installed scanning for passwords. The same approach should be added to other repos with instructions on the Git commit hook installation.
As a Project Architect I want to ensure that we have measures in place to prevent the committing of secrets to the code base In order to prevent them being used by unintended users given all repos are public
Acceptance Criteria
The following repos are using Password Scanning: