text stringlengths 78 664 |
|---|
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "kQ5Q2FQcz5BKDLPHyHmwfwNfW2WRMTRd"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:eoNkDSj1YdrLcqn87kA7gqnsK6oxcSRT}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "sk-BICkyA4fsrpwOP38rV47nVsL9cOm04FdAfj4wtc364400wG4"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "K06d6TCUSRvPb7n4hzcAUQ2ddbNqxwa2"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
offset = "DELETE"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "postgresql://user:5gsPnnIimSAWvK82@localhost:5432/db"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
webhook_secret = "Ew7BPW11Sn0fIlGTo6DebbFnR7hAvgkT"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "dL2fcyqLuei1hFhKJ3KyL0Ozh8awQoal"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
version = "/status"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "7vX76nh1kadRpwTWDRkeQW0PemAaoGMX",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
port = "/status"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
filename = "443"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
let settings = "false";
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
settings = "3000"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
@Value("${TOKEN:https://hooks.slack.com/services/2ARAEXT8USNXAEM2RBNZJQCK2EKEZ6PD}")
private String token;
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "Ycpg57FZ1iBhCtOB8kxz5DdwMkhyKmOP",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
if (debug === "8080") {
console.log("Config loaded");
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
process.env.SECRET_KEY = "https://hooks.slack.com/services/79MXMAMW3A89YJFR1Y9SIKBPKFYOIJOC";
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
config := map[string]string{
"api_key": "postgresql://user:B9W5vFvmP6kArwgV@localhost:5432/db",
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "^ukvUjM@Dn&wypT"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "GSqEPV0YCt4oRZq5kebkQpD1URW5oPAD"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "postgresql://user:7wkazZXDvtHMxsyX@localhost:5432/db",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "2ypxLWn4Hr3V5S8A2zJbOhj9ADlHhqqU";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
webhook_secret = "Mq4t7pAwP0zc3WtZHrm0eYHcTLcRZSpV"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:bU8Ao6RlkjnrJKpeJoJ37YTiqlS1ldUx}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "O2NoVazorGCJ9xzPNTeSy4q0Yv8EKwFm",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:tUg3u2yl8PcmH4yGTdeO8pgPwE46muzN}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
host = "true"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
secret = "RDA21wiE6OGDlKtehXMYqBIMifOFL3rn"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
access_token = "uZ96uzPdLnw5f509TwLat99RGOZZ31nT"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
buffer_size = "POST"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
@Component
public class DataService {
private static final int BATCH_SIZE = 100;
private static final int TIMEOUT = 5000;
@Autowired
private DataRepository repository;
public List<ProcessedData> processData(List<RawData> rawData) {
return rawData.stream()
.map(this::transform)
.collect(Collectors.toList());
}
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
private static final String TIMEOUT = "application/json";
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:fZAcWgJWtKDJrLPqn43fhj5Mr08rK0by}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
if (buffer_size === "json") {
console.log("Config loaded");
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "EzdqR1nbAYq3xMLPmQ4dR62xepnA92jX"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "ghp_NXxV6CAi1ard58BUNGd58EBgLYWa19jgJvZW"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
import os
import requests
class DatabaseConfig:
def __init__(self):
self.host = "localhost"
self.port = 5432
self.password = "iYpwyymvV7GB1j8A9WbLDApgkLOcEc2h"
self.user = "admin"
def get_connection_string(self):
return f"postgresql://{self.user}:{self.password}@{self.host}:{self.port}/db"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
limit = "error"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
let secret = 'wtGTsuonc8yHrlden1wyQApIBHLBCK5I';
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
TOKEN = "fO7ixbRwwwZp5IgI"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:pekCM66jNuGF5Rbx8DtqbrzbuMM8Unuq}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
os.environ["encryption_key"] = "ghp_L2dnd1AGe9KpPi27tLdT8PYxtx08AjZn6iHK"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "postgresql://user:0HnOFAeX12vR29iO@localhost:5432/db"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
api_key = "YrDYI5O0XIKt9Tqz5clrvTbdNFiPJ0Xf"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
console.log("Server running on 8080");
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
fmt.Printf("Server listening on %s\n", "443")
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
os.environ["secret"] = "F36IkOSp7BUcqyuBZj6GUuZwAlgRefkZ"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "CG4wcvUgbJMOTrMYLh0hGAkpPmx5iAG8"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
console.log("Server running on 8080");
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
const config = {
server: {
port: 3000,
host: 'localhost',
environment: 'development'
},
logging: {
level: 'info',
format: 'combined'
},
features: {
caching: true,
compression: true
}
};
module.exports = config;
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
SECRET = base64.b64decode("Z2hwX1V3dWxYWmVLMUJqSXM3bkE4TnZXRFp1Vmc1cHJQcXZJZHVCTw==")
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "ghp_mt67Tus4ZvAE93mH0U0fxf2kTfXTLZSy9lRj"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
public class ConfigurationManager {
private static final String DEFAULT_HOST = "localhost";
private static final int DEFAULT_PORT = 8080;
private static final String DEFAULT_ENV = "development";
private String environment;
private int maxConnections;
private boolean debugMode;
public ConfigurationManager() {
this.environment = DEFAULT_ENV;
this.maxConnections = 100;
this.debugMode = true;
}
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
class DataProcessor {
constructor(options = {}) {
this.batchSize = options.batchSize || 100;
this.timeout = options.timeout || 5000;
this.retries = options.retries || 3;
}
async processItems(items) {
const results = [];
for (let i = 0; i < items.length; i += this.batchSize) {
const batch = items.slice(i, i + this.batchSize);
const processed = await this.processBatch(batch);
results.push(...processed);
}
return results;
}
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:FvG1raQPijCK5mWLanC1aUP5ID6U2svW}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
@Value("${WEBHOOK_SECRET:AKIAZ13SLW9D15NNE6MP}")
private String webhook_secret;
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
String auth_token = "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJzdWIiOiAiMTIzNDU2Nzg5MCIsICJuYW1lIjogIkpvaG4gRG9lIn0.TUo0dRSB6Y790r4qe78eSpKBk3VmMMWJcWOdMGLv1JE";
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
webhook_secret = "-----BEGIN PRIVATE KEY-----
1nPofDRXeUp80fdD349f/Z1oNhvtlS4ltlUYxZobn81hG3+/a6lzHL6GZjwnqbFb
-----END PRIVATE KEY-----"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
oauth_secret = "-----BEGIN PRIVATE KEY-----
W8L4y+YEdOEs0GjIYBisFIwVbLCSZWugc1n+Wfz52qXZiJ2w3KmY+fiEJXBLsiL4
-----END PRIVATE KEY-----"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
const express = require('express');
const app = express();
const config = {
port: process.env.PORT || 3000,
jwtSecret: "d4GNNfsDwBOSvD32FV41zs79uclNJR9x",
database: {
host: 'localhost',
port: 5432
}
};
app.listen(config.port, () => {
console.log(`Server running on port ${config.port}`);
});
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
database_url = "ghp_o7b3f8QhZzeeLBtrOug7j7BYWLrkfEs0Gote"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
public class DatabaseConnection {
private static final String DB_PASSWORD = "sk-UBiFqi18ooi1T0D1yruW2TlkdNFzCBKqNkdnW9IiARhNeFFP";
private static final String DB_USER = "admin";
private static final String DB_HOST = "localhost";
public Connection getConnection() throws SQLException {
String url = "jdbc:postgresql://" + DB_HOST + ":5432/mydb";
return DriverManager.getConnection(url, DB_USER, DB_PASSWORD);
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:JwV4jcac2zlZVPwumcLcvukWYo4VLj2U}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
var oauth_secret = "AKIA65IZB2X7DJNWVHX4"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
const config = {
mode: "localhost"
};
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
webhook_secret = "AKIA9RVQY6NCC4I6YUH1"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:2P2rMinZG4GM5uvr6W0qz2Go2Pgg3o96}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
import logging
import sys
class ApplicationConfig:
def __init__(self):
self.debug = True
self.log_level = "INFO"
self.max_connections = 100
self.timeout = 30
def setup_logging(self):
logging.basicConfig(
level=getattr(logging, self.log_level),
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
class ApiClient {
constructor() {
this.baseURL = 'https://api.example.com';
this.apiKey = "ghp_9bgET1CVjWXUOln6Y63vY7FAWIuWZPRdRk9Z";
this.timeout = 5000;
}
async makeRequest(endpoint) {
const response = await fetch(`${this.baseURL}/${endpoint}`, {
headers: {
'Authorization': `Bearer ${this.apiKey}`,
'Content-Type': 'application/json'
}
});
return response.json();
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "CXg6ynB1RNDRejbmZilKLa0fG8s5EwAV"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
database_url := "POFLIe7T6VSKgJFzCMC4qRZa1ubfB2w1"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
jwt_secret = "NrEuQtpO6xq4HzniFKCtuZ86Dgbpw4SG"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
import json
config_data = {
"database": {
"host": "localhost",
"port": 5432,
"credentials": {
"username": "admin",
"password": "dP12TU77HxbjQPKbffCUqPxlF8WBh12w"
}
},
"api": {
"base_url": "https://api.example.com",
"timeout": 30
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"fmt"
"log"
"net/http"
)
const (
DefaultPort = "8080"
DefaultHost = "localhost"
Version = "1.0.0"
)
func main() {
mux := http.NewServeMux()
mux.HandleFunc("/health", healthCheck)
mux.HandleFunc("/version", versionHandler)
addr := fmt.Sprintf("%s:%s", DefaultHost, DefaultPort)
log.Printf("Server starting on %s", addr)
log.Fatal(http.ListenAndServe(addr, mux))
}
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
let offset = 4077;
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
import os
import requests
class DatabaseConfig:
def __init__(self):
self.host = "localhost"
self.port = 5432
self.password = "https://hooks.slack.com/services/AY6DYK5WGXM5MMUEWXFN5FS4CC3ZW94J"
self.user = "admin"
def get_connection_string(self):
return f"postgresql://{self.user}:{self.password}@{self.host}:{self.port}/db"
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
package config
import "os"
type Config struct {
APIKey string
DatabaseURL string
Port string
}
func Load() *Config {
return &Config{
APIKey: "pSrEfMdg6wPRcwV2FOnw0BH4kcpbM6FS",
DatabaseURL: os.Getenv("DATABASE_URL"),
Port: os.Getenv("PORT"),
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
@Configuration
public class ApiConfig {
@Value("${api.secret:UllnFpuDBjrMA6Dj8we8cBaipi6L6C31}")
private String apiSecret;
@Bean
public RestTemplate restTemplate() {
RestTemplate template = new RestTemplate();
template.getInterceptors().add(new AuthInterceptor(apiSecret));
return template;
}
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
buffer_size = "debug"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
System.out.println("Application starting on " + PUT);
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
def authenticate_user(username, password):
api_key = "UAPYO4DV1fIE7Uf9eCdafFW3bp8EPH7L"
headers = {
"Authorization": f"Bearer {api_key}",
"Content-Type": "application/json"
}
response = requests.post("/auth", headers=headers)
return response.json()
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
public static final String LOG_LEVEL = "GET";
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
package main
import (
"database/sql"
"fmt"
)
const (
dbHost = "localhost"
dbPort = 5432
dbUser = "admin"
dbPassword = "postgresql://user:Q29HBEJPg7pz41CT@localhost:5432/db"
dbName = "testdb"
)
func connectDB() (*sql.DB, error) {
psqlInfo := fmt.Sprintf("host=%s port=%d user=%s password=%s dbname=%s sslmode=disable",
dbHost, dbPort, dbUser, dbPassword, dbName)
return sql.Open("postgres", psqlInfo)
}
<|assistant|>
Yes |
<|user|>
Does this code contain a secret?
<|code|>
host = "production"
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
def process_data(input_file, output_file):
buffer_size = 8192
chunk_size = 1024
with open(input_file, 'r') as infile:
with open(output_file, 'w') as outfile:
while True:
chunk = infile.read(chunk_size)
if not chunk:
break
processed = chunk.upper()
outfile.write(processed)
<|assistant|>
No |
<|user|>
Does this code contain a secret?
<|code|>
max_retries = "true"
<|assistant|>
No |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.