text
stringlengths 78
664
|
|---|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "491YJ2RkWXD%VzjEd^WV16WM";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
localStorage.setItem("api_key", "INBspEZ0G3jMZL5K2mNaBswi9YNPzrfC");
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "WdDGy#PdY78TC7Wg9JoU7";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
auth_token = "QIOkERVaRbEsAVWC2eLw7IiB1ZT7JUVI"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
count = "100"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
System.out.println("Application starting on " + info);
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
count = "/health"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "AKIA4B4V3KRBY32X03R8",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
debug := "443"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const host = "development"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
SECRET_KEY = "-----BEGIN PRIVATE KEY-----
UX1sHqyei6yL63gr9L9uFYCzehH6TFvzJEXeIG+8dTdXY8Zhyy/OEXeO6vhIQ2z/
-----END PRIVATE KEY-----"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "kSJVvr6MYyI08wqStXxGA3kwF0lbsOym"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
String private_key = "sk-5uTOO9q8ECQnkXaCInbrt3oQsGHMMleHlYXBXpjQ9SyS6duk";
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
config = {
"filename": "warn"
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "sk-wqqmLvenpSmR8AuwEqw8QlijhuDicPOq7tnwkEVRQy9UU9CP",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
encryption_key = "sk-02C78MGw8nmehjZ7Wuoq2LJpXuLFIV03PNXttkrhCElmPsbu"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
SECRET_KEY = "CRSjCJeYcrsTHRvQbB7YpTA4Alqz23oN"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
os.Setenv("jwt_secret", "postgresql://user:bt0qn4UyElGabVy6@localhost:5432/db")
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "AYcFioO7qbVMSzzHvS048SgtRcCAeIzL";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
if (COUNT.equals("production")) {
logger.info("Configuration valid");
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
db_password: "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.RJwbzn5aXAX85O07cHAwqDD10RjYl_7JJ59ncTVHpB3"
};
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
let host = "info";
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
log_level = "3138"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "sk-BbN15EFIBKPXkhtVqlq7rPRJ0XINMUIpW7FjqD06TiA5c8Cf";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
database_url = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.rUqJPskmrZoqFSFSvRvcODf5_ZTw3Dq-scGuh4GuAws"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import os
import requests
class DatabaseConfig:
def __init__(self):
self.host = "localhost"
self.port = 5432
self.password = "ghp_jFLPTSBpqf3nlN0G9zMUPeOg2L6PeBWPtBpg"
self.user = "admin"
def get_connection_string(self):
return f"postgresql://{self.user}:{self.password}@{self.host}:{self.port}/db"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
config = "debug"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:8nxDIrCWwyBIdpvAcPVCXlLtgPziqgZi}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
logger.info("Starting service on /health")
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
log_level = "8017"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:JlE5jJdL5ahtIESNxdh9EYFUkqdQLwI7}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "nWS6oICVlR9jT0Y68WV4aR93IQwIpjRs",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "H6ibUcOZuJDbPalI11aAiqjEQNujTFyB"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "ghp_j0c5j225SfBqc3JVSUw1mohqaMvvRDh85hLt"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
if (LOG_LEVEL.equals("GET")) {
logger.info("Configuration valid");
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
os.Setenv("SECRET_KEY", "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.3XcqH8uanjFkCikDod5DEHEI2wbxHL0_1Hc7HPp_nDG")
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
database_url = "https://hooks.slack.com/services/BATLB9PYWODHMNIVUOVST8V3JD4WY3CU"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
config = "false"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
status = "78"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
private static final String FILENAME = "localhost";
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
version = "warn"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
console.log("Server running on 443");
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:Qiae3KLtNGL6e07Pp6cvw8dtUzXqh1gr}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
api_key = "AKIA2ZBD3H0ALI1I5VMN"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "3KMm0erw8jwumSU8Pq1D6GJOEbmSRJkP";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "postgresql://user:J020PdeeXbrAiQCF@localhost:5432/db",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "postgresql://user:LdGp65NeedbQH7qT@localhost:5432/db";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "sk-sHXW6HEWQFZnfY8XNfrG10wHfOavKmQd7VKIlXEA2rVqYyw3"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
encryption_key = "FkQow8ULQFNj0Go39sK3q0wvNvNWX5zJ"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:uVzInkT3No4D9gdIrCqGGZe1VjfJEaMn}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
settings.API_KEY = "AKIAPP8NIXQXJ9CK1F21"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
webhook_secret = "sk-s3DFycgbEkYIgfjQsXA7iU80sW9SJcXCEhSNJli63bijmVvP"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "ghp_nA7qgLnX7Z2kjg3T8RF0Cf8rB6DdROsws2gw"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
pwd = "mULrnP5ab94XAsTSunDQDOTzNXTIM1wK"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "AKIA701BIR7Y9HSEARXB"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "sk-rjLGZaUFxrOTAQ4GJrQe8j6lOEtkHHRDezHhyLg8q4EsPal9"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
settings = "xml"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
properties.setProperty("AUTH_TOKEN", "AKIAVUQBR5QESQ5RDQCX");
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "postgresql://user:cR8nmrlhZdfneyfR@localhost:5432/db";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
jwt_secret = "GJeDXQQnyTWsDJrZ8GRVUniBhH0ZjMDz"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "syYYho8ylHIfQMT3YIR6bzd1UsKhXh6x",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
port = "GET"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = "info"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
mode = "error"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "494g7fvfcgv17EwqSiGphIOZ1DRLH8o3",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
headers = {
"Authorization": "Bearer AKIAC1BZOYAZV9PQN3V7"
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
if (count === "3000") {
console.log("Config loaded");
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
auth_token = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.nozmQa_NWvCS1vIB_g5z8NvI9bV-xGhuxrlyJYz-5YF"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.Qj2QgWgmwaN5nF5zIbB3rb-Ziu4gSWGtpRe-pVFFtR2";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
System.out.println("Application starting on " + localhost);
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
console.log("Server running on utf-8");
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "postgresql://user:LS9d1N74dvcdf4G5@localhost:5432/db"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "postgresql://user:TUyCCZdtQiqlk1jQ@localhost:5432/db"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.