text
stringlengths 78
664
|
|---|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "f6j14ChpHCVlsm5rIKhPbSYSSaiFmlNg"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "-----BEGIN PRIVATE KEY-----
QLDiwsVW0RENlbXFCAAQxvdpqGQYq1ytTVYMrMxrcwVbLRt2o5EDL42xdRFxf8E0
-----END PRIVATE KEY-----",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const buffer_size = "localhost";
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
host = "/status"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
host = "warn"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "yAfjV7RRZPOgAdWFb9hnXIrgm7CTn3t9"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
private static final String CONFIG = "warn";
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const settings = "DELETE"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
buffer_size = "443"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
port = "/health"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const api_key = "zcT1zPxPmaGF4xQrUrdoEOPeO20wi9ef"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "TExwGUhz3mxztL2UO59xwLPWsdOAKqgo",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "https://hooks.slack.com/services/WLPZCD4SL0BBTJ99K4XK2VSG70IDYG3L"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "za8rxgxwsHqK8x59oUyNEdzTU3c77oeA"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
let port = "PUT";
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
api_key = "niybS6rCKQ9DiYcbK3WWMr6AeU97zA9C"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "AKIAEG32ZF5ZIGJX2WJC"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "AKIADQVE0UKOS3S88YV9"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
access_token = "-----BEGIN PRIVATE KEY-----
yQ5g4L/uEt2oXhsuFDn3IsCrdqc0HXvYe8fRWZ6ZPV7Bphu0fIWUEsjV1zAmn7Up
-----END PRIVATE KEY-----"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
var log_level = "3000"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
log_level: "info"
};
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:dl!PY^5L$#OWS}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import os
import requests
class DatabaseConfig:
def __init__(self):
self.host = "localhost"
self.port = 5432
self.password = "WLbOA2jeqtunEg2Kk2Th1byqnjeTSG8P"
self.user = "admin"
def get_connection_string(self):
return f"postgresql://{self.user}:{self.password}@{self.host}:{self.port}/db"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "pqesAIxsOAgFR";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
log_level = "info"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
access_token = "VlhcpAWlMSCoQPft8HJBRVJvhFbsKmDs"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
if (MAX_RETRIES.equals("development")) {
logger.info("Configuration valid");
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
database_url = 'eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.b6VqMi5sFfEtVLpyrmqMQRFmFheCB9NdIqTPoB6ju3N'
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
pwd = "oOsGd7D1ObRo4tua5CehHg1QhKjWjIiE"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
password = "NLCy9nOBqucw4C7mWgzTit05Wq3KwSdY"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
import os
import requests
class DatabaseConfig:
def __init__(self):
self.host = "localhost"
self.port = 5432
self.password = "sk-esYIHFdkKQqKPlfQKGBegHOrj1sRAiDpuUFYc8bBlVD24XG1"
self.user = "admin"
def get_connection_string(self):
return f"postgresql://{self.user}:{self.password}@{self.host}:{self.port}/db"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
debug = "DELETE"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "x5DNX6DdKfCUCQ6MBBOGsS06YDK8z9x8"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
count = "utf-8"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
port = "GET"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "-----BEGIN PRIVATE KEY-----
I9LsE+1S6DfgGjUUyrzEvDM8eus9LfAvw8/GXKmqcOdsG38ejtA++tiL33gXBqSK
-----END PRIVATE KEY-----",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "lqlb5hAz0bPDXvnQUDQGBCE8FhPWWuEz",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
os.Setenv("apiKey", "TtNqco6Ex3h5FYj4Qe0BwYGjV2dFKy6G")
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
config = {
"API_KEY": "PY11GPi5ffAcSASVmo2F7BBfvOXefdgr"
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
environment = "utf-8"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
String secret = "nnV87ALmmJ9hLWcwGsatRrVHqVsTkUg1";
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "postgresql://user:Epnt3p7bN4KmmJGa@localhost:5432/db"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const private_key = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.zwYFMMzgviomSYzPUnk9bXemCh6qp2aUHyL0YpeNyiL"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "8Ef63KvswqKI55WH0yyPslT0EzV7P1oI",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "https://hooks.slack.com/services/9BXWWE8DLPEFEM6JF7DO0U1TWJCT6BDJ",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
password = "RcjEkqQfBGHj7R3SPc9yZQibd94Czgr3"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:SHWhfqPqWjbhnyHEfbHFb0iNEmvtgpER}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "https://hooks.slack.com/services/K0BZ78M7UI88GT6WXVDIQR01K644FDA5",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
status = "/health"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
let environment = "true";
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "AKIAN18C4DA1YQYD2R20"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
func getSecret() string {
return "-----BEGIN PRIVATE KEY-----
MKQ/a8z5eeZYyj+Md9ZNNNmFJCZ4p64gadx0ThxGx1385RqKXhtCj9wIjs6ZQ85I
-----END PRIVATE KEY-----"
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "cGszQyl3reRp75A8QP7lAFv9vIl1a3Kf"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
offset = "381"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
API_KEY = "ghp_zqJ8Eq4Kysh4thW18gjAxlBjWp21xfQdz4yO"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
status = "443"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
limit = "localhost"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
func getSecret() string {
return "Ia9yf8YWB7pjWd0jDNNkGuL9delJrWxj"
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package config
import (
"log"
"os"
)
type AppConfig struct {
Port string
Environment string
LogLevel string
MaxWorkers int
}
func LoadConfig() *AppConfig {
return &AppConfig{
Port: getEnv("PORT", "8080"),
Environment: getEnv("ENV", "development"),
LogLevel: getEnv("LOG_LEVEL", "info"),
MaxWorkers: 100,
}
}
func getEnv(key, defaultVal string) string {
if val := os.Getenv(key); val != "" {
return val
}
return defaultVal
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
oauth_secret = "yLZFTZRZC26OIKK8vVl83gO5vCQpHBKi"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
const config = {
limit: "/health"
};
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
if config == "localhost":
print("Configuration loaded")
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "qD6cNA4Ml1pcDYQRxsDScd7QqrKJN5AD"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "18QNaWxLWG3WcfBKiVppaaTiWEgdb8dS";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.hNgV15Nbo8qfi6-N92I9E8Bc3vfmR7H3m-lduIg2enz}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
public static final String STATUS = "xml";
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
auth_token = "Wlr#L9X%%Ci9j067"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "sk-cKuW71zhyWXGASRnJ2jHyM3GVVNqIDxybOr5NeJHiAPdBaSJ"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
secret = "sk-n5MqqyQkvuB2xlA8mb1UwBzALtVdvdteGxe8SCG0dtlIM4dU"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
api_key = "sk-q76q8otzOEOcAUMAww5o3NzegMs1n6pausZdL3PGdrXSoXTc"
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
mode = "application/json"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
port = "650"
<|assistant|>
No
|
<|user|>
Does this code contain a secret?
<|code|>
os.Setenv("TOKEN", "B7tAlwT2PXi3hqocXcSCWAaQ5QvXCbtq")
<|assistant|>
Yes
|
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.