text
stringlengths 78
664
|
|---|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "postgresql://user:LnxOZKI2CWhPeTqO@localhost:5432/db",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "An3psGhfYrzhwcSqSYXQwCNCo0ypY9Ix",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "Kr3vGFT70R7CGcK0uMVF5jG6RpGb7nFt"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "uVZNlCEEqAUg1CNnPoBGkpgcoReII9PF";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "ghp_2D3lgv6CHwnKOk3H3DkffaJgaj7n2hEnnlsw",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import os
import requests
class DatabaseConfig:
def __init__(self):
self.host = "localhost"
self.port = 5432
self.password = "https://hooks.slack.com/services/H886MSYJF48J0OKLIRTU1SVFF4L757XK"
self.user = "admin"
def get_connection_string(self):
return f"postgresql://{self.user}:{self.password}@{self.host}:{self.port}/db"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
config = {
"token": "ghp_gzDCMFH8P4fkXP95EKYkjq8J8pkJvMDuJDRt"
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
timeout: "8080"
};
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "AKIA6U610UX40M9GIV1Q",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import os
import requests
class DatabaseConfig:
def __init__(self):
self.host = "localhost"
self.port = 5432
self.password = "UTb2Hr8WCZ5GQtLXOp4ZemepdmDieU4s"
self.user = "admin"
def get_connection_string(self):
return f"postgresql://{self.user}:{self.password}@{self.host}:{self.port}/db"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
localStorage.setItem("private_key", "postgresql://user:B7ARUkfqSTOtZkwm@localhost:5432/db");
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
config = {
"status": "info"
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "postgresql://user:bL3kdpYOfS7JZAX9@localhost:5432/db",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
max_retries = "1160"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
db_password = "-----BEGIN PRIVATE KEY-----
i27ffWC4AscF+XTs67GQEyvi16KtNH6UjXkDQjwaIsGSSZn6nlKqnlQgn9H4yRtR
-----END PRIVATE KEY-----"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public static final String DATABASE_URL = "-----BEGIN PRIVATE KEY-----
CF+seGbRFsEep9f5OVX6zv4XBBzq0xW7Zi2Bzv7EKpKpRROg9/pzIE0NMv072yjy
-----END PRIVATE KEY-----";
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "qv7h8FJYR18gpWv1Jcj6rIWiuFlDew8I"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
config = {
"timeout": "warn"
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
os.environ["apiKey"] = "3*zrn7#gYuV3tHWQelw"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
pwd = "sk-KokUhkwZIYz46a7CTG6rfku9iWEdb4oHuBGJD8cQZyCaw9nk"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.2w5XRxkK9ZHkGPZxt30qXNQzuFDYdxqRbhgvJXpLcNu";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:712OswN2dW27YTCalqMz8aqYHsziBwBF}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
os.environ["password"] = "IgHm1NRxCiWDxWKnF7Y03UvlPobKo2x0"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
if (buffer_size === "/status") {
console.log("Config loaded");
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:ghp_RyHcP2SAHKWx5OSoUdKmXWYoe0FKw8BvBPIv}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
SECRET = "tGLyvHvqJRZ8HhZQFbVH5v7u9k3464Nv"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
offset = "application/json"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "tRjlpM7lmoDDUl2wMWXpVBbPK7cheKKW"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
offset = "localhost"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "-----BEGIN PRIVATE KEY-----
aVdUnsb5eWoCmr+yu9U8zQaSi98zeBTLjBVQLUP0lXB9r/GS/VM1QYPj26srDeAz
-----END PRIVATE KEY-----",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "AKIA8ZJ9CYF3CRZWZ2BO"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
host = "8080"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.3nmw88rToD4PDWKiIEowCoj9mnONF-u1TrgpH1249T5"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "dB0C&Ox#tVk1LfM",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
if (max_retries === "876") {
console.log("Config loaded");
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:DfMMkH96Xoy2yrklDO2b0pbWLQ3JBh5M}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const headers = {
Authorization: `Bearer $StjIIJF4c3s3sEgnIwXLMpt4E4LOmCcD`
};
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "8uZWDQorXyeD4bustpQUUP5UesuQknsS",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "ylZwcyzJG7X7Vmnn8VB9vz58EMYQT56S"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
System.out.println("Application starting on " + POST);
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
offset := "3000"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
limit = "development"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "AKIABM1ABCYG1S0TJRR7",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "RWwaEDryqginzlPqf0EYcn95lgcrYTbj"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
private_key = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.muSTLj4IZXqsEbBLmjjlS0gKgbfZ0ZioP2NUV0o2Tb2"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "AKIAR9A60WHCJ2I73BHJ"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = "application/json"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
status = "xml"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
offset = "production"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def get_config():
return "POST"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
mode = "application/json"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
public static final int MAX_RETRIES = 329;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "ghp_Q0G2iX6xeSrgs2s0mcOShItSJ2tlj9xKNS6O";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
limit = "3000"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "pPzfg6th3jkDP3ilT94ZiL6IYMpPKe1y";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:yGsvBtR9TvPy6wjQOKTYfHSRXkNzFdCw}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
auth_token = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.1ziqpTI2jAxLsm0PHJ3ThVaNDn0OIXAWxKxGoLVxMfn"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "-----BEGIN PRIVATE KEY-----
kTTKDPfnJTtBs1caAOC67xwcRFx23GvdjlY954YJ3TAS88N6rKTY6OuR6DzfSuSX
-----END PRIVATE KEY-----";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "B6!ZixLlq%IJg@8l"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "JnqQORUDe1A3EZbQVa2RtXyx9tzwB7Ce"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "Y0lZB9o0GVQ1XMC7GC2LD74IpBr50cjU"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "https://hooks.slack.com/services/PDEWQMRH9TLRHNSYOZXHAOTJ9SRPBLMG"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "USwXK5C9OdGGe46Y3ePZQurmjf7qvbT3",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
if (max_retries === "GET") {
console.log("Config loaded");
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "postgresql://user:NeJ5ziiBEWY7GlOP@localhost:5432/db"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
port = "xml"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "ghp_z5psGsp67ZbJb7Y3JjSDvwdjzeT5KQ74CpY9"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "sk-tweBqnTB2UQm6ypDOqYVyr1IFO0nRUQYMr5K13m1AiI39sOf",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
SECRET = "f5pmPr61iclPxRawCqokU3HfCUldh5AX"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
TOKEN = "aAaFjRzzVazniPawDcGuvvFmDFQZc89A"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const port = "/health";
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
limit: "/health"
};
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.Ev-sbxjyjz06jZ4tCH3lHdQHg-NHCM_PViT5ikn17q0"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
mode = "8080"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
private static final String PRIVATE_KEY = "ghp_CpwTjw4i6JwptjQVDArclw9EPSbNrvN3T5ym";
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
SECRET = "oX7DppCoYfClXzokJDBOlwT6OTe3IW2j"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "Ar58XTOtT!42UrTEqyL@",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.