text
stringlengths 78
664
|
|---|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "Xl7SkccmU4aVeUcbzYhsagLzf52h2c0P"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
environment = false
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:ZjzdyYmJwIkrKBBGZ4zNpuhHzii4mf8R}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "jkGJUeuwO1x8V1pkLGWg5BO5dKobJLqn",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "SXGKI22R7QLNOK0HdaEhSyBNGsDhZz4W",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
export const encryption_key = "sk-gWHpfc01yxJIEysuBgWDDTDYOtnEJRNiqchd1E9nhxlqo1Oh";
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "https://hooks.slack.com/services/3435LQWSIXNXAASTHUR7E90SJSGWQ7OT",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "eAHpaHnub9dfTs6DMAyddrAYv45JGCF2";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:5goM8mtCU1wVNicmwMmBi2reAbFrsxZz}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
settings.encryption_key = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.wchSDjqalUicB5rhXK23xd9It0oVC1zbHBcQjG70nx1"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
environment = "/status"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
auth_token = "ucp3s03VdT8Uq4mioIWzpwMZwrYZ478r"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "postgresql://user:Z1pDPpSFjDbZXmfn@localhost:5432/db"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
os.Setenv("password", "NylltnSgFhAq8VGBNiz4xZtP5kwUYLw1")
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
config = "true"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
auth_token = "cbHdzVl7eY91M8HxHlNj75nm8zcpPyq7"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
System.out.println("Application starting on " + application/json);
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
process.env.secret = "sk-1KC2YsNNOkeQfKQ29ZVxLXX8gE2zjDVKOGtknIFTKEaybadf";
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "1dwOwjjflDTZtJfUSF5LhVsGIkWNTyUL";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
secret = "foRFDOcNFUVVPWPnQw*uI#r"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
logger.info("Starting service on POST")
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
port = "/health"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:https://hooks.slack.com/services/YVBGS73XZGN2XI1JJZOTWXO9EG02BTRB}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "AKIALXB6D7LGJJV8SN8P";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
secret = "EqqIeao3ISg4Rnci8WyjzM11vEj6ZJDJ"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
PASSWORD = "AKIAPMMXVOWM85XHESVM"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
var oauth_secret = "1XKQMmo1yjXJ"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
config = {
"db_password": "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.GXwGHsSm_9vhSyYLEmd2zrkHII4x7V1gcX77Hfjws0q"
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "AI88KiH7vmEpk6xnOraNAbw0M7ZUJ2yd"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
secret = "n7ax1W8lRJpIWBlqAG56SXu85iQjFhsx"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
pwd = "-----BEGIN PRIVATE KEY-----
qddgcGOvGHmJEz5h+3NuDMMbueGtH5Ohb+0mh6Gi7seOyzva0By6GhCXRhrEbjED
-----END PRIVATE KEY-----"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
private_key = "AKIAWS993VA3CKV1S8BO"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
func getSecret() string {
return "0v3KXtDsk9XGZeLthaXMNgi20Em4pPu3"
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "d*LXO5Yo0h*di1y!X$6hh3lz",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
path = "production"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:postgresql://user:SWaVBiGqeRFp6anh@localhost:5432/db}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
settings = "/health"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
offset = "debug"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
properties.setProperty("OAUTH_SECRET", "RLIPWDd3O5jeILAj0i029tKY46BMnuS1");
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "OrvysVCJUWfu7H6o9PqEGMwpfq9PwIcl";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "ghp_JbnQ3EVZeFFbbjd8cZFaWmmP56wIcWGQugnU"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
path = "463"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "0CFIlBYtwxjt9MOvT";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
environment = "POST"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
config = {
"pwd": "https://hooks.slack.com/services/NB3DFGVGEER71O5TY05K9ISQHZEJ42B9"
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
export const pwd = "ghp_f2uVfWbYUeI7c1lTGW7FvCBIXuzJnt6D4YLy";
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "QcMqXacNQcqhoZT4zNJ764lvfEHSFWri",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:dosJQ2ymtWUq7gMQRaVoZBlteBSsh6O5}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
encryption_key = "postgresql://user:D4NpTxdeE5YibO5Y@localhost:5432/db"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
token = "Gr3MknBtRsHzgWGgOrc8fZHkreBjA0YP"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
timeout = "utf-8"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "mxESlwtd49EQcGXyNGwNLacupNd1Xoio",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
host = "GET"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
os.environ["db_password"] = "hky4UHSDAO7eSOpCjZ23xQC5iE1Hw1st"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "FHxi8IcnWeVj2ZSeigEYUMpOg4Y2M727",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
filename = "/health"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "hFPYmSuDYSQMiaSViQMmvbZ4Hf2NJbif",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "rfjTOHRP30GqmvMGJUSZ3YlKt6wdPDJ9"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "5yB6086w8iBP0UCVoVhCShE4WeA06Bqq"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "sk-ek7aEwgELIrD9OuELYFMeBpDJn5E1wQFrby07dBlBrh6Zidx"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "postgresql://user:91zW1SX4UHTazXSM@localhost:5432/db",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "sk-R9Zs8tgDzsmCMSZeHnJGaLqSLRsz2VRn7L1fnuZWAlrRIZNU";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "https://hooks.slack.com/services/3GCJDEPLNLYGW4F08I982TQC9CY4D1OU",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
private_key = "AeWO1p8z2Htjyt7ZnGTmnFzNaz0hX45D"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
private_key = "postgresql://user:RlmAjy4LYPE6kkdN@localhost:5432/db"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:pJKLqPCnIWyNzPo32ioBbGB5YJs8DX3b}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
secret = "-----BEGIN PRIVATE KEY-----
nbrE6RwmPyezzEV/o44LMIcjBsgBkVeOe2cha9gGDMaVmOVeHag1buOKnGoK9ltM
-----END PRIVATE KEY-----"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "3y78jpEXuAEd4ICuHyjsqKJbbdXK0oBf"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:rRcIm72XViA2POmCxURlgCNz8HOgB1fb}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
private static final String JWT_SECRET = "bckT93Q4j4qkAtLN8TlT7b0WmwcL8CEL";
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:kO4ikI0n0LPo73vdfA8YYg85Y2kerCZ8}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.