Closed codefromthecrypt closed 3 years ago
Before, we used heuristics in multiple places to decode credentials.
Now that the build is organized better, we can use credentials only where needed. This helps instruct what access is needed for what step.
Before, we used heuristics in multiple places to decode credentials.
Now that the build is organized better, we can use credentials only where needed. This helps instruct what access is needed for what step.