uid stringlengths 36 36 | dataset_index stringlengths 5 7 | repo stringlengths 11 60 | file_path stringlengths 6 104 | line_number stringlengths 1 4 | secret_type stringclasses 4
values | secret_value stringlengths 12 50 | secret_length stringclasses 35
values | secret_entropy stringlengths 6 6 | is_verified stringclasses 1
value | line stringlengths 21 977k | prefix stringlengths 203 930 | prefix_token_count stringclasses 1
value | prefix_token_budget stringclasses 1
value |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
680156fa-f2ec-569a-b26d-9c79418cd100 | 22397 | miritih/WeConnect | tests/v2/test_delete_business.py | 20 | Secret Keyword | qwerty123!@# | 12 | 3.5850 | False | "password": "qwerty123!@#", | unittest
import json
from app import create_app
from app.models.v2 import Business
class DeleteBusinessTestCase(unittest.TestCase):
"""This class represents the api test case"""
def setUp(self):
"""
Will be called before every test
"""
self.app = create_app('testing')
... | 128 | 128 |
6321bc49-dd8c-5e99-80bc-78ebc314318e | 32025 | Goutham2591/mav-cpi | UnoCPI/settings.py | 190 | Secret Keyword | capstone2018 | 12 | 3.5850 | False | EMAIL_HOST_PASSWORD = 'capstone2018' | from_env)
###Email settings
LOGIN_REDIRECT_URL = reverse_lazy('/')
LOGIN_URL = reverse_lazy('login')
#LOGOUT_REDIRECT_URL = reverse_lazy('logout')
## Sample Import files download source location, DONOT DELETE
MEDIA_ROOT = os.path.join(BASE_DIR, 'media')
MEDIA_URL = '/media/'
##
EMAIL_HOST = 'smtp.gmail.com'
EMAIL_HO... | 128 | 128 |
843d0b00-80dc-5193-9ade-7e1a5cfaa27e | 43128 | martinmartinchan/cookbook | src/configurations.py | 22 | Secret Keyword | Aweki2235zxc | 12 | 3.4183 | False | PASSWORD = "Aweki2235zxc" | artinChan.mysql.pythonanywhere-services.com"
USER = "MartinChan"
PASSWORD = "Aweki2235zxc"
DATABASE = "MartinChan$cookbook"
class DevelopmentConfig(Config):
DEBUG = True
HOST = "localhost"
USER = "root"
PASSWORD = "Aweki2235zxc"
DATABASE = "cookbook"
class TestConfig(Config):
TESTING = True
HOST = "localhos... | 128 | 128 |
1bf53f07-9b00-514e-8d66-c883d9dcd285 | 46256 | ekhalilbsq/iaso | iaso/tests/api/test_setup_account.py | 23 | Secret Keyword | tiredofplayingthesameagain | 26 | 3.7962 | False | admin = m.User.objects.create_superuser(username="zelda", password="tiredofplayingthesameagain") | .source = source
version = m.SourceVersion.objects.create(data_source=source, number=1)
account.default_version = version
account.save()
cls.account = account
user = m.User.objects.create(username="link")
user.set_password("tiredofplayingthesameagain")
user.save(... | 128 | 128 |
c1dd9377-7ab5-533f-b8dd-9dc0cf3047f2 | 46747 | Jean-Baptiste-Lasselle/outil-prod-postgreSQL | conf/pgadmin4/config_local.py | 147 | Secret Keyword | pbkdf2_sha512 | 13 | 3.5466 | False | SECURITY_PASSWORD_HASH = 'pbkdf2_sha512' | (or a specific
# adaptor address.
#
# NOTE: This is NOT recommended for production use, only for debugging
# or testing. Production installations should be run as a WSGI application
# behind Apache HTTPD.
DEFAULT_SERVER = '0.0.0.0'
# The default port on which the app server will listen if not set in the
# environment... | 128 | 128 |
db8260a1-7a08-5004-a556-bbbf61661705 | 55014 | cdepillabout/clearml | clearml/task.py | 2123 | Secret Keyword | thisisseceret123 | 16 | 3.1556 | False | :param str secret: The user secret (in the key/secret pair). For example, ``secret='thisisseceret123'`` | :param str api_host: The API server url. For example, ``host='http://localhost:8008'``
:param str web_host: The Web server url. For example, ``host='http://localhost:8080'``
:param str files_host: The file server url. For example, ``host='http://localhost:8081'``
:param str key: The user key (i... | 128 | 128 |
6bfb75ca-49d1-550f-a3d5-6c47ab364bea | 61983 | Daemonxiao/airbyte | airbyte-integrations/bases/base-normalization/integration_tests/dbt_integration_test.py | 158 | Secret Keyword | MyStr0ngP@ssw0rd | 16 | 3.6250 | False | "password": "MyStr0ngP@ssw0rd", |
with open("../secrets/mysql.json", "w") as fh:
fh.write(json.dumps(config))
def setup_mssql_db(self):
start_db = True
if os.getenv(NORMALIZATION_TEST_MSSQL_DB_PORT):
port = int(os.getenv(NORMALIZATION_TEST_MSSQL_DB_PORT))
start_db = False
else:
... | 128 | 128 |
cb89dd2b-27c9-5afe-879e-dab8c4f1cff2 | 62935 | gzklcece/FinancialFileFetcher | tests/test_FinancialFileFetcher.py | 9 | Secret Keyword | a42ff36922e94fbba2a2ad35a595905f | 32 | 3.3369 | False | ret_df = FinancialFileFetcher.get_urls(l_identifier = l_identifier, api_key = 'a42ff36922e94fbba2a2ad35a595905f', start_date = start_date, end_date = end_date, l_file_form = l_file_form) | from FinancialFileFetcher import FinancialFileFetcher
def test_geturls():
l_identifier = ['AAPL', 'MSFT']
test_key = 'a42ff36922e94fbba2a2ad35a595905f'
start_date = '2020-01-02'
end_date = '2021-09-01'
l_file_form = ['10-Q','10-K']
ret_df = FinancialFileFetcher.get_urls(l_identifier = l_identif... | 128 | 128 |
b2aee58d-3310-59db-b66b-9241588a9567 | 71902 | awesome-archive/DjangoBlog | accounts/tests.py | 20 | Secret Keyword | liangliangyy1 | 13 | 2.7774 | False | username="liangliangyy1", password="liangliangyy1") | django.contrib.auth import get_user_model
from django.contrib.sites.models import Site
import datetime
from accounts.models import BlogUser
from django.core.urlresolvers import reverse
# Create your tests here.
class AccountTest(TestCase):
def setUp(self):
self.client = Client()
self.factory = R... | 128 | 128 |
1ce55487-1b51-540e-b5be-f02e549c45d9 | 73093 | AstroProfundis/hostap | tests/hwsim/test_ap_pmf.py | 325 | Secret Keyword | 0123456789abcdef0123456789abcdef | 32 | 4.0000 | False | password_hex="0123456789abcdef0123456789abcdef", | add_ap(apdev[0], params)
key_mgmt = hapd.get_config()['key_mgmt']
if key_mgmt.split(' ')[0] != "WPA-EAP-SHA256":
raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
dev[0].connect("test-pmf-required-eap", key_mgmt="WPA-EAP-SHA256",
ieee80211w="2", eap="PSK", identity="... | 128 | 128 |
a8508a4f-aad7-5003-90b8-e233ee78180d | 76013 | holly-evans/airflow | tests/providers/amazon/aws/secrets/test_secrets_manager.py | 41 | Secret Keyword | postgresql://airflow:airflow@host:5432/airflow | 46 | 4.1563 | False | 'SecretString': 'postgresql://airflow:airflow@host:5432/airflow', | , mock_get_value):
mock_get_value.return_value = "scheme://user:pass@host:100"
conn = SecretsManagerBackend().get_connection("fake_conn")
assert conn.host == 'host'
@mock_secretsmanager
def test_get_conn_uri_full_url_mode(self):
secret_id = 'airflow/connections/test_postgres'
... | 128 | 128 |
f3a0ccef-a30e-54b7-8d09-6f78b5aa8976 | 77670 | mauricecarey/py_crypt_keeper_client | py_crypt_keeper_client/tests/test_client.py | 39 | AWS Access Key | AKIAIH2MAE6QZULURAMQ | 20 | 3.5219 | False | content=b'{"document_id": "a5689603-9570-4af5-9b95-5fbcdcde4201", "document_metadata": {"compressed": false, "content_length": 1304, "content_type": "text/plain", "encryption_type": "AES|CBC", "name": "test_upload.txt", "uri": "http://www.mauricecarey.com/"}, "resource_uri": "/api/v1/document_service/upload_url/a568960... | icecarey.com/"}, "resource_uri": "/api/v1/document_service/upload_url/a5689603-9570-4af5-9b95-5fbcdcde4201/", "single_use_url": "https://s3.amazonaws.com/akiaih2mae6qzuluramq-crypt-keeper/a5689603-9570-4af5-9b95-5fbcdcde4201?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential= | 128 | 128 |
782eed07-f193-5c23-89bd-65952a148614 | 80079 | neverware-mirrors/hostap | tests/hwsim/test_ap_eap.py | 174 | Secret Keyword | ffdca4eda45b53cf0f12d7c9c3bc6a | 30 | 3.6696 | False | password="ffdca4eda45b53cf0f12d7c9c3bc6a", |
eap_connect(dev[0], apdev[0], "SIM", "1232010000000000",
password="ffdca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581",
expect_failure=True)
logger.info("Invalid GSM-Milenage key")
dev[0].request("REMOVE_NETWORK all")
eap_connect(dev[0], apdev[0], "SIM", ... | 128 | 128 |
522f7288-28d9-538c-89ff-bc6ac42e3c72 | 80079 | neverware-mirrors/hostap | tests/hwsim/test_ap_eap.py | 2138 | Secret Keyword | ff23456789abcdef0123456789abcdef | 32 | 3.9375 | False | password_hex="ff23456789abcdef0123456789abcdef", | ")
hostapd.add_ap(apdev[0]['ifname'], params)
eap_connect(dev[0], apdev[0], "PAX", "pax.user@example.com",
password_hex="0123456789abcdef0123456789abcdef")
eap_reauth(dev[0], "PAX")
logger.info("Negative test with incorrect password")
dev[0].request("REMOVE_NETWORK all")
eap_con... | 128 | 128 |
d36914d8-1255-58e4-a12c-ba9d433b64b0 | 86885 | xUndero/noc | cmibs/huawei_sys_man_mib.py | 185 | Secret Keyword | 1.3.6.1.4.1.2011.5.25.19.1.11.1.1.11 | 36 | 2.2419 | False | "HUAWEI-SYS-MAN-MIB::hwBootRomPassword": "1.3.6.1.4.1.2011.5.25.19.1.11.1.1.11", | .1.1.8",
"HUAWEI-SYS-MAN-MIB::hwBootRomGatewayIp": "1.3.6.1.4.1.2011.5.25.19.1.11.1.1.9",
"HUAWEI-SYS-MAN-MIB::hwBootRomUserName": "1.3.6.1.4.1.2011.5.25.19.1.11.1.1.10",
"HUAWEI-SYS-MAN-MIB::hwBootRomPassword": " | 128 | 128 |
3eb89c7e-5226-5235-89a9-2a5a8210bf8d | 89759 | CosmosTUe/Cosmos | tests/user/forms/registration.py | 16 | Secret Keyword | ikbeneenbrood | 13 | 2.8731 | False | pwd2="ikbeneenbrood", | .contrib.auth.models import User
from django.test import TestCase
from apps.users.forms import RegisterUserForm
from apps.users.forms.error_codes import DUPLICATE_EMAIL, INVALID_EMAIL
class RegisterUserFormTest(TestCase):
@staticmethod
def generate_form(
first_name="Tosti",
last_name="Broodje... | 128 | 128 |
0c0f3130-7149-55fa-aeba-6c005d27920e | 100304 | gidantribal/django-map-widgets | tests/testapp/testapp/settings.py | 92 | Secret Keyword | mapwidgetdbu | 12 | 3.4183 | False | 'PASSWORD': 'mapwidgetdbu', | ',
'django.contrib.auth.context_processors.auth',
'django.contrib.messages.context_processors.messages',
],
},
},
]
WSGI_APPLICATION = 'testapp.wsgi.application'
# Database
# https://docs.djangoproject.com/en/1.10/ref/settings/#databases
DATABASES = {
'def... | 128 | 128 |
e7d38383-f1ec-54c5-8de2-9c213f09c9fa | 126882 | mrabhi05/webproctor | webproctor/settings.py | 141 | Secret Keyword | aajminiproject321 | 17 | 3.7345 | False | EMAIL_HOST_PASSWORD = 'aajminiproject321' # host email password required | files/
STATIC_URL = '/static/'
STATICFILES_DIRS=[
STATIC_DIR,
]
LOGIN_REDIRECT_URL='/afterlogin'
#for contact us give your gmail id and password
EMAIL_BACKEND ='django.core.mail.backends.smtp.EmailBackend'
EMAIL_HOST = 'smtp.gmail.com'
EMAIL_USE_TLS = True
EMAIL_PORT = 587
EMAIL_HOST_USER = 'aajminiproject@gmail.c... | 128 | 128 |
b53b6cc4-ae9d-5019-b0af-79c2b6e84606 | 140863 | kaebmoo/brew | get_tag_data-0.py | 57 | Secret Keyword | GPBO64VFP5PRX1BP | 16 | 3.3750 | False | writeAPIkey = "GPBO64VFP5PRX1BP" # Replace YOUR-CHANNEL-WRITEAPIKEY with your channel write API key | disconnect():
logging.debug("disconnect is work")
microgear.setalias("BrewGateway")
microgear.on_connect = connection
microgear.on_message = subscription
microgear.on_disconnect = disconnect
microgear.connect(False)
# Enter Your API key here
myAPI = 'GPBO64VFP5PRX1BP'
# URL where we will send the data, Don't cha... | 128 | 128 |
c09d3412-3bb2-5a77-a6ac-437653ba60ba | 144902 | rpenna/post-scheduler | backend/tests/test_user.py | 33 | Secret Keyword | wewereNOTonabreak | 17 | 3.2639 | False | 'password': 'wewereNOTonabreak' | body': {
'name': 'Rachel Green',
'email': 'rachel_green@friends.com',
'password': 'wewereNOTonabreak'
}
}
@pytest.fixture
def data_user_invalid_email():
mimetype = 'application/json'
return {
'headers': {
'Content-Type': mimetype,
... | 128 | 128 |
0c1a4d09-d7ba-5bde-99b7-8f35dc0c0b2b | 148296 | Himanshu-Lakhara/cpython | Lib/test/test_smtplib.py | 1293 | Secret Keyword | doesnotexist | 12 | 2.9183 | False | smtp.password = 'doesnotexist' | self):
self.serv.add_feature('AUTH PLAIN')
smtp = smtplib.SMTP(HOST, self.port,
local_hostname='localhost', timeout=15)
smtp.login('psu', 'doesnotexist')
smtp.close()
def testAUTH_PLAIN_initial_response_auth(self):
self.serv.add_feature('AUTH PLAI... | 128 | 128 |
c106cd0a-8b1b-5cb9-889a-e8f0d388aa4e | 152121 | Allan690/StoreManager-V2 | tests/test_users.py | 21 | Secret Keyword | allangmailcompany | 17 | 3.1019 | False | password="allangmailcompany")), | /auth/login",
data=json.dumps(
dict(email="allan@gmail.com",
password="allangmailcompany")),
content_type="application/json")
self.assertEqual(resp_login.statu... | 128 | 128 |
1ddf2914-33c1-58e7-a36a-91bf16be6d4d | 154736 | Ahaan-R/DataVisualization- | application.py | 20 | Secret Keyword | gDnvwj+XPhMOz3QaFuD1+K4nARWp2CMhvqiWJurR7Mk= | 44 | 4.9877 | False | # port=6379, db=0, password='gDnvwj+XPhMOz3QaFuD1+K4nARWp2CMhvqiWJurR7Mk=') | adb'
username = 'ameydhuri'
password = 'Kavya@2309'
driver = '{ODBC Driver 17 for SQL Server}'
# myHostname = "amey.redis.cache.windows.net"
# myPassword = "gDnvwj+XPhMOz3QaFuD1+K4nARWp2CMhvqiWJurR7Mk="
#
# r = redis.Redis(host='amey.redis.cache.windows.net',
# port=6379, db=0, password=' | 128 | 128 |
6a3dee42-7fd0-5d4d-a266-a616041eb36e | 166704 | Four-sun/Requests_Load | config/Login_comment.py | 62 | Secret Keyword | xiaozhangyang | 13 | 3.0270 | False | "loginPwd": "xiaozhangyang" | _code, login_etbc.text))
return login_etbc.cookies
except AssertionError as Error:
logger_message.logwarning(u"%s\t方法名:%s\t异常原因:%s" % (send_time, sys._getframe().f_code.co_name, Error))
def new_Loging_etbc():
u"""发送请求登陆etbc"""
try:
payload = {
"loginName": "xiaozhangy... | 128 | 128 |
d03605f0-7511-5ee9-acef-605c1851e089 | 183528 | Vanclief/gemini-python | tests/client_test.py | 19 | Secret Keyword | 974554aed089 | 12 | 3.0850 | False | assert g.api_key == '974554aed089' | /'
TRADES_URL = 'https://api.gemini.com/v1/trades/'
SYMBOLS_URL = 'https://api.gemini.com/v1/symbols'
def test_should_have_correct_url():
g = Gemini()
assert g.api_base == 'https://api.gemini.com/v1/'
def test_should_have_api_key():
g = Gemini('974554aed089', '2976be9e189d')
assert g.api_key == ' | 128 | 128 |
fcf8a79b-0bdc-5f52-957c-319bb57e8a57 | 183528 | Vanclief/gemini-python | tests/client_test.py | 24 | Secret Keyword | 2976be9e189d | 12 | 3.0221 | False | assert g.api_secret == '2976be9e189d' | _should_have_correct_url():
g = Gemini()
assert g.api_base == 'https://api.gemini.com/v1/'
def test_should_have_api_key():
g = Gemini('974554aed089', '2976be9e189d')
assert g.api_key == '974554aed089'
def test_should_have_secret_key():
g = Gemini('974554aed089', '2976be9e189d')
assert g.api_... | 128 | 128 |
ef68953a-6f0d-5e60-99fa-e38cd2026e90 | 188426 | UlordChain/ulord-blog-demo | python/junior.py | 18 | Secret Keyword | 8326648968ad11e8b894fa163e37b4c3 | 32 | 3.5900 | False | junior = Junior(appkey="8326648868ad11e8b894fa163e37b4c3", secret="8326648968ad11e8b894fa163e37b4c3") | # @Author: PuJi
# @Date : 2018/5/14 0014
import os, time, requests, json, logging
from uuid import uuid1
from flask import request, g, jsonify
from ulordapi.manage import app, User
from ulordapi.errcode import return_result
from ulordapi.user import Junior
log = logging.getLogger('webServer')
junior = Junior(app... | 128 | 128 |
ef38c780-e242-5e76-816a-155427a04949 | 189260 | pieterb/werkzeug | tests/test_wrappers.py | 1156 | Basic Auth Credentials | p%C3%A4ssword | 13 | 3.3927 | False | assert headers["location"] == "http://%C3%BCser:p%C3%A4ssword@xn--n3h.net/p%C3%A5th" | AT_THE_FUCK",
)
assert req.get_data() == data
assert isinstance(req.stream, LimitedStream)
def test_urlfication():
resp = wrappers.Response()
resp.headers["Location"] = u"http://üser:pässword@☃.net/påth"
resp.headers["Content-Location"] = u"http://☃.net/"
headers = resp.get_wsgi_headers(cr... | 128 | 128 |
85cd7771-5896-5a87-ba39-4c400bbcb57f | 193982 | mendersoftware/integration | tests/tests/test_access.py | 369 | Secret Keyword | correcthorse | 12 | 2.6887 | False | auth = Authentication(name=tname, username=email, password="correcthorse") | = CliTenantadm(containers_namespace=env.name)
tid = cli.create_org(tname, email, "correcthorse", plan)
tenant = cli.get_tenant(tid)
tenant = json.loads(tenant)
ttoken = tenant["tenant_token"]
# the cli now sets all addons to 'enabled' -
# disable them for initial 'all ... | 128 | 128 |
68b99d50-233f-5e50-9882-23d40b0ab43e | 214113 | grkoll/impacket | examples/raiseChild.py | 492 | Secret Keyword | 1.2.840.113556.1.4.90 | 21 | 2.9871 | False | 'unicodePwd': '1.2.840.113556.1.4.90', | AMAccountName': 0x900DD,
'unicodePwd': 0x9005A,
'dBCSPwd': 0x90037,
'supplementalCredentials': 0x9007D,
}
ATTRTYP_TO_ATTID = {
'objectSid': '1.2.840.113556.1.4.146',
'userPrincipalName': '1.2.840.113556.1.4.656',
'sAMAccountName': '1.2.840.113556.1.4.221',
... | 128 | 128 |
3671a0e4-8ddd-5fff-aeb3-f103353be1bc | 214113 | grkoll/impacket | examples/raiseChild.py | 493 | Secret Keyword | 1.2.840.113556.1.4.55 | 21 | 2.7966 | False | 'dBCSPwd': '1.2.840.113556.1.4.55', | dBCSPwd': 0x90037,
'supplementalCredentials': 0x9007D,
}
ATTRTYP_TO_ATTID = {
'objectSid': '1.2.840.113556.1.4.146',
'userPrincipalName': '1.2.840.113556.1.4.656',
'sAMAccountName': '1.2.840.113556.1.4.221',
'unicodePwd': '1.2.840.113556.1.4.90',
'dBCSPwd': ' | 128 | 128 |
033c1e87-f280-52a6-91db-1da5b5f972fd | 221906 | sage905/cloudatcost-ansible-module | cloudatcost_ansible_module/cac_server.py | 135 | Secret Keyword | longStringFromCaCAPI | 20 | 3.8219 | False | api_key: 'longStringFromCaCAPI' | # Create a server
- local_action:
module: cac_server
api_user: bob@smith.com
api_key: 'longStringFromCACApi'
label: cloudatcost-test1
cpus: 1
ram: 1024
storage: 10
template_id: 26
runmode: safe
wait: yes
wait_timeout: 3600
state: present
# Ensure a running se... | 128 | 128 |
a486205f-3a4f-56e4-a73a-c8e705b10148 | 231146 | vadyur/script.module.vd-common | lib/vdlib/scrappers/tvshowapi.py | 280 | Secret Keyword | 1D62F2F90030C444 | 16 | 3.1556 | False | __apikey = '1D62F2F90030C444' | com/api/GetSeriesByRemoteID.php?imdbid=ttxxxxxxx&language=ru id=<Data><Series><id>
# 2. http://thetvdb.com/api/1D62F2F90030C444/series/<id>/all/ru.zip zip -> banners.xml, actors.xml, ru.xml
# noinspection SpellCheckingInspection
class TheTVDBAPI(object):
__base_url = 'http://thetvdb.com/api/'
__apikey = ' | 128 | 128 |
94b05b41-125a-50d8-b3e7-06f753cc1864 | 232149 | henriktao/pulumi-azure | sdk/python/pulumi_azure/compute/windows_virtual_machine_scale_set.py | 1698 | Secret Keyword | P@55w0rd1234! | 13 | 3.5466 | False | admin_password="P@55w0rd1234!", | internal = azure.network.Subnet("internal",
resource_group_name=example_resource_group.name,
virtual_network_name=example_virtual_network.name,
address_prefixes=["10.0.2.0/24"])
example_windows_virtual_machine_scale_set = azure.compute.WindowsVirtualMachineScaleSet("exampleW... | 128 | 128 |
01c77cff-2b10-5e95-9df7-834b688645f4 | 233295 | dreid/python-jose | tests/test_jwt.py | 65 | JSON Web Token | eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhIjoiYiJ9. | 50 | 4.5064 | False | token = u'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhIjoiYiJ9.jiMyrsmD8AoHWeQgmxZ5yq8z0lXS67_QGs52AzC8Ru8' | CI6IkpXVCJ9.eyJuYW1lIjoidGVzdCJ9.D8WLFPMi3yKgua2jm3BKThFsParXpgxhIbsUc39zJDw')])
def test_numeric_key(self, key, token):
token_info = jwt.decode(token, key)
assert token_info == {"name": "test"}
def test_invalid_claims_json(self):
old_jws_verify = jws.verify
try:
tok... | 128 | 128 |
ea586891-3999-5807-b5f8-a02761f953ac | 246455 | hung/confluence-dumper | settings.sample.py | 22 | Secret Keyword | sup3rs3cur3pw | 13 | 2.7193 | False | HTTP_AUTHENTICATION = {'username':'johndoe','password':'sup3rs3cur3pw'} | # This work is licensed under the terms of the MIT license.
# See the LICENSE.md file in the top-level directory.
# Confluence URL
CONFLUENCE_BASE_URL = 'http://192.168.240.188:8090'
# A list of space keys to export (leave it empty to export all available spaces)
SPACES_TO_EXPORT = []
# Confluence authentication
# ... | 128 | 128 |
99deeb75-4a2d-5f42-9e48-204f2d33df85 | 257441 | aaronlam88/cmpe295 | python/models/save_top_5_and_last_5.py | 22 | Secret Keyword | cmpe295.sjsu.2018 | 17 | 3.7345 | False | 'password': "cmpe295.sjsu.2018", | get config to connect to database
import json
import mysql.connector
# use this to save data, so we don't have to keep getting data from database
import pickle
# for deepcopy
import copy
import logging
logging.basicConfig(level=logging.DEBUG)
logger = logging.getLogger(__name__)
class SaveRank:
"""This class pro... | 128 | 128 |
07abfdac-7362-5008-a3a8-b081f8d625e0 | 263671 | aldamian/django-agenda | python3_8/lib/python3.8/site-packages/allauth/account/tests.py | 265 | Secret Keyword | AbCdEf!123456 | 13 | 3.7004 | False | "password2": "AbCdEf!123456", | _response=False,
)
def _password_set_or_change_redirect(self, urlname, usable_password):
self._create_user_and_login(usable_password)
return self.client.get(reverse(urlname))
def test_ajax_password_change(self):
self._create_user_and_login()
resp = self.client.post(
... | 128 | 128 |
0154ee07-7c3a-5bff-9f60-1e24eb76fb86 | 266742 | andrewhingah/storemanager | instance/config.py | 23 | Secret Keyword | gvhbjnkmsjbknmlnjk | 18 | 3.1552 | False | JWT_SECRET_KEY = "gvhbjnkmsjbknmlnjk" | Parent configuration class."""
DEBUG = False
CSRF_ENABLED = True
class DevelopmentConfig(Config):
"""Configuration fro Development."""
DEBUG = True
JWT_SECRET_KEY = "gvhbjnkmsjbknmlnjk"
class TestingConfig(Config):
"""Configuration for Testing."""
TESTING = True
DEBUG = True
J... | 128 | 128 |
72186723-8fd0-5b29-a22f-50df907292b3 | 269237 | basicpail/core | homeassistant/components/growatt_server/sensor.py | 817 | Secret Keyword | eChargeToday1 | 13 | 3.3927 | False | api_key="eChargeToday1", | =DEVICE_CLASS_ENERGY,
),
GrowattSensorEntityDescription(
key="mix_load_consumption_solar_today",
name="Load consumption today (solar)",
api_key="eChargeToday",
native_unit_of_measurement=ENERGY_KILO_WATT_HOUR,
device_class=DEVICE_CLASS_ENERGY,
),
GrowattSensorEnti... | 128 | 128 |
f6c5b459-c0b2-5133-aac3-247808ddcb5f | 271227 | mer-salem/recipe-app-api | app/core/tests/test_models.py | 17 | Secret Keyword | veza12121212 | 12 | 2.2516 | False | password = 'veza12121212' | from django.contrib.auth import get_user_model
# from django.contrib.auth.base_user import AbstractBaseUser
from core import models
def simple_user(email='test@gmail.com', password='password'):
return get_user_model().objects.create_user(email, password)
class TestCaseModel(TestCase):
email = 'vezA@gmail.co... | 128 | 128 |
8b7e7161-96b9-5a1c-bb9d-3e7ed0485fda | 280044 | Siikakala/kompassi | access/utils.py | 30 | Secret Keyword | bcdfghjklmnpqrstvwxz0123456789 | 30 | 4.9069 | False | PASSWORD_ALPHABET = 'bcdfghjklmnpqrstvwxz0123456789' | .compile(r'\.+', re.UNICODE)
def emailify(ustr):
ustr = ustr.lower()
ustr = ''.join(EMAILIFY_CHAR_MAP.get(c, c) for c in ustr)
ustr = EMAILIFY_FORBANNAD_RE.sub('', ustr)
ustr = EMAILIFY_MULTIDOT_RE.sub('.', ustr)
ustr = SLUGIFY_MULTIDASH_RE.sub('-', ustr)
return ustr
PASSWORD_ALPHABET = ' | 128 | 128 |
1c64bd8a-ba6e-5052-80cd-90cbbe40ab35 | 292820 | mubix/impacket | examples/secretsdump.py | 1293 | Secret Keyword | 1.2.840.113556.1.4.94 | 21 | 2.9511 | False | 'ntPwdHistory': '1.2.840.113556.1.4.94', | supplementalCredentials': 0x9007D,
'objectSid': 0x90092,
}
ATTRTYP_TO_ATTID = {
'userPrincipalName': '1.2.840.113556.1.4.656',
'sAMAccountName': '1.2.840.113556.1.4.221',
'unicodePwd': '1.2.840.113556.1.4.90',
'dBCSPwd': '1.2.840.113556.1.4.55',
'ntPwdHistory': ' | 128 | 128 |
c160e747-b3de-5575-93d4-46cf270872bc | 292820 | mubix/impacket | examples/secretsdump.py | 1294 | Secret Keyword | 1.2.840.113556.1.4.160 | 22 | 2.8631 | False | 'lmPwdHistory': '1.2.840.113556.1.4.160', | }
ATTRTYP_TO_ATTID = {
'userPrincipalName': '1.2.840.113556.1.4.656',
'sAMAccountName': '1.2.840.113556.1.4.221',
'unicodePwd': '1.2.840.113556.1.4.90',
'dBCSPwd': '1.2.840.113556.1.4.55',
'ntPwdHistory': '1.2.840.113556.1.4.94',
'lmPwdHistory': ' | 128 | 128 |
1b6ce67c-1948-5bcb-8798-9f0cb63a7266 | 292820 | mubix/impacket | examples/secretsdump.py | 1297 | Secret Keyword | 1.2.840.113556.1.4.96 | 21 | 2.9871 | False | 'pwdLastSet': '1.2.840.113556.1.4.96', | 840.113556.1.4.90',
'dBCSPwd': '1.2.840.113556.1.4.55',
'ntPwdHistory': '1.2.840.113556.1.4.94',
'lmPwdHistory': '1.2.840.113556.1.4.160',
'supplementalCredentials': '1.2.840.113556.1.4.125',
'objectSid': '1.2.840.113556.1.4.146',
'pwdLastSet': ' | 128 | 128 |
d6854e4e-5678-56cf-8982-737da7d0b24d | 298381 | robot2051/dto-digitalmarketplace-supplier-frontend | config.py | 46 | Secret Keyword | no-reply@marketplace.digital.gov.au | 35 | 4.1503 | False | RESET_PASSWORD_EMAIL_FROM = 'no-reply@marketplace.digital.gov.au' | _HTTP_PROTO = 'http'
DM_SEND_EMAIL_TO_STDERR = False
DM_CACHE_TYPE = 'dev'
DEBUG = False
GENERIC_CONTACT_EMAIL = 'marketplace@digital.gov.au'
DM_GENERIC_NOREPLY_EMAIL = 'no-reply@marketplace.digital.gov.au'
DM_GENERIC_ADMIN_NAME = 'Digital Marketplace Admin'
RESET_PASSWORD_EMAIL_NAME = DM... | 128 | 128 |
632f83ce-cffa-588c-8418-1088dcab5364 | 310460 | FrederichRiver/neutrino3 | venus/venus/kg.py | 15 | Secret Keyword | neutrino2020 | 12 | 3.0850 | False | graph = Graph('http://localhost:7474', username='neo4j', password='neutrino2020') | StockEventBase
from libmysql_utils.mysql8 import GLOBAL_HEADER
import re
graph = Graph('http://localhost:7474', username='neo4j', password='neutrino2020')
def create_stock_node():
event = StockEventBase(GLOBAL_HEADER)
df = event.mysql.select_values('stock_manager', 'stock_code,stock_name')
df.columns = ... | 128 | 128 |
6ac3356c-44c3-57c1-8777-733dd41bfc5e | 320942 | bracoe/ctrlx-automation-sdk | samples-python/datalayer.calc/main.py | 51 | Basic Auth Credentials | boschrexroth | 12 | 3.0850 | False | connection_tcp = "tcp://boschrexroth:boschrexroth@10.0.2.2" | password here - default is boschrexroth
# - IP_ADDRESS: 127.0.0.1 If you develop in WSL and you want to connect to a ctrlX CORE virtual with port forwarding
# 10.0.2.2 If you develop in a VM (Virtual Box, QEMU,...) and you want to connect to a ctrlX virtual with port forwarding
# 192.1... | 128 | 128 |
54175a66-c04c-56d4-a613-b62a1fc9886a | 330803 | aoifeosullivan19/comp30670project | Scraping_Files/scraper.py | 111 | Basic Auth Credentials | dublinbikes2018 | 15 | 3.6402 | False | engine = create_engine('mysql+mysqlconnector://dublinbikesadmin:dublinbikes2018@dublinbikes.cglcinwmtg3w.eu-west-1.rds.amazonaws.com/dublinbikes') | _update=datetime.datetime.fromtimestamp(i['last_update']/1000, pytz.timezone('Europe/Dublin'))
available_bikes=i['available_bikes']
delete_rows(number, available_bike_stands, last_update, available_bikes)
#http://pythondata.com/collecting-storing-tweets-python-mysql/
def connect():
"""... | 128 | 128 |
3e07869a-436e-53df-abf2-103a471a01ed | 337787 | brunocamposal/ekommerce | accounts/tests/test_views.py | 23 | Secret Keyword | salesman@456 | 12 | 3.2516 | False | "password": "salesman@456", | APITestCase, APIClient
from rest_framework.authtoken.models import Token
class UserViewsTest(APITestCase):
def setUp(self):
self.user_admin = {
"username": "admin",
"password": "admin@123",
"is_superuser": True,
"is_staff": True
}
self.use... | 128 | 128 |
ce03daca-b43c-5f1e-a1e4-e3fc8256939e | 342646 | neilgiri/hotstuff | scripts/util/test_cloudlab.py | 13 | Secret Keyword | TeFxy^FVv8Z5 | 12 | 3.4183 | False | # cloudlab_password='TeFxy^FVv8Z5', | python
import cloudlab_util as cl
from geni.rspec import pg as rspec
from geni.util import loadContext
def see_slice():
c = loadContext("/tmp/context.json", key_passphrase='TeFxy^FVv8Z5')
print(c.cf.listProjects(c))
cl.do_release(c, 'testing138', ['cl-utah'])
#cl.release(experiment_name='testing136',... | 128 | 128 |
dcb88229-5ed1-592f-b716-e83ee5c99adf | 343437 | malthejorgensen/simple-detect-secrets | tests/plugins/keyword_test.py | 141 | Secret Keyword | m{{h}o)p${e]nob(ody[finds>-_$#thisone}}\ | 40 | 4.4653 | False | 'fooprivate_keyfoo\'m{{h}o)p${e]nob(ody[finds>-_$#thisone}}\';', # Single-quotes | #thisone}}";', # Double-quotes
'fooapikeyfoo "m{{h}o)p${e]nob(ody[finds>-_$#thisone}}";', # Double-quotes
'fooapikeyfoo"m{{h}o)p${e]nob(ody[finds>-_$#thisone}}";', # Double-quotes
'private_key \'m{{h}o)p${e]nob(ody[finds>-_$#thisone}}\';', # Single-quotes
'fooprivate_... | 128 | 128 |
99b17850-0543-525d-a258-0e71ac677c20 | 344944 | duanasq/tink | python/tink/jwt/_jwt_format_test.py | 161 | JSON Web Token | eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UifQ | 39 | 4.2823 | False | b'eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UifQ') | json_loads(json_payload)
self.assertEqual(payload['iss'], 'joe')
self.assertEqual(payload['exp'], 1300819380)
self.assertEqual(payload['http://example.com/is_root'], True)
self.assertEqual(
_jwt_format.decode_payload(_jwt_format.encode_payload(json_payload)),
json_payload)
def test_cr... | 128 | 128 |
e7c89aaa-06d5-5525-9e27-258313a41588 | 344944 | duanasq/tink | python/tink/jwt/_jwt_format_test.py | 180 | JSON Web Token | eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UifQ. | 40 | 4.2939 | False | 'eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UifQ.' | ), signature)
def test_create_signed_compact(self):
unsigned_compact = b'eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UifQ'
signature = _jwt_format.decode_signature(
b'dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk')
self.assertEqual(
_jwt_format.create_signed_compact(
unsigned_compact, si... | 128 | 128 |
2bde39a1-62d1-5770-a339-d6e96f602215 | 345609 | eodcgmbh/openeo-openshift-driver | gateway/_old/models.py | 171 | Secret Keyword | mySecr3tP@ssword | 16 | 3.7500 | False | "password": "mySecr3tP@ssword" | arguments."
},
"output": {
"type": "dict",
"description": "Output format to be used. Supported formats and options can be retrieved using the GET /capabilities/output_formats endpoint."
}
}
class password(Schema):
type = "object"
description = "Password to ... | 128 | 128 |
1af8b0ca-ae3d-5fa8-88be-b82aa273437e | 352474 | gkshindia/CrawlWunder | project/tests/test_config.py | 27 | Secret Keyword | c83cfc83bb93424592f531605766b6c1 | 32 | 3.5778 | False | self.assertTrue(app.config['SECRET_KEY'] == 'c83cfc83bb93424592f531605766b6c1') | config.DevelopmentConfig')
return app
def test_app_is_development(self):
self.assertTrue(app.config['SECRET_KEY'] == 'c83cfc83bb93424592f531605766b6c1')
self.assertFalse(current_app is None)
class TestTestingConfig(TestCase):
def create_app(self):
app.config.from_object('proje... | 128 | 128 |
7ec6fabe-8164-5928-b14d-675bc448fa1b | 356076 | NatsuhikoFutamura/modern-django | config/settings/base.py | 49 | Secret Keyword | j#z7+*09yvg%g24mc9#+lm3mmj7_4)*vq+8#snmv3x367ier9c | 50 | 4.6411 | False | #SECRET_KEY = 'j#z7+*09yvg%g24mc9#+lm3mmj7_4)*vq+8#snmv3x367ier9c' | KEY is set
https://medium.com/@djstein/modern-django-part-1-project-refactor-and-meeting-the-django-settings-api-d2784efb606f
"""
SECRET_KEY = env('DJANGO_SECRET_KEY', default='j#z7+*09yvg%g24mc9#+lm3mmj7_4)*vq+8#snmv3x367ier9c')
# SECURITY WARNING: keep the secret key used in production secret!
#SECRET_KEY = ' | 128 | 128 |
ebc69442-ac0c-5b95-a3e8-bfba7c32cf58 | 358105 | MarionMcG/dataRepresentation | week6/lab2.5.py | 13 | Secret Keyword | ad2489f9c8f2dfe48e22d07f8a42efc2191be62c | 40 | 3.5649 | False | apikey = 'ad2489f9c8f2dfe48e22d07f8a42efc2191be62c' | 7dc4f8f3f5b1384bdf3b2e" https://api.github.com/user/repos
#Returns 401 unauthorised at the time of my attempt
#7. Checking info on my own github
# curl -i -H "Authorization: token ad2489f9c8f2dfe48e22d07f8a42efc2191be62c" https://api.github.com/user/repos works
# Get data from my public dataRepresentation repo
impo... | 128 | 128 |
9ae524cd-720a-5592-8a7c-7be6a4c8d40f | 368874 | h-zanetti/jewelry-manager | webdev/produtos/tests/test_deletar_produtos.py | 20 | Secret Keyword | MinhaSenha123 | 13 | 3.2389 | False | usr = User.objects.create_user(username='TestUser', password='MinhaSenha123') | pytest.fixture
def criar_produto(db):
return Produto.objects.create(
nome='Produto Legal',
colecao="d'Mentira",
familia='Zanetti',
data_criacao='2021-04-30',
unidades=0,
tamanho=22
)
@pytest.fixture
def resposta_deletar_produto(client, criar_produto):
usr = ... | 128 | 128 |
ec571f20-1656-593f-9069-9981e07b1ffb | 370298 | tmwh/virgil-sdk-python | tests.py | 113 | Secret Keyword | https://keys-private-stg.virgilsecurity.com/v3 | 46 | 4.2490 | False | private_key_link = 'https://keys-private-stg.virgilsecurity.com/v3' | val_token):
response = virgil_hub.virgilcard.delete_card(type, value, val_token, card_id, private_key,
password)
assert response == '', 'We`ve got a problem'
if __name__ == '__main__':
token = VIRGIL_APPLICATION_TOKEN
ident_link = 'https://identity-stg... | 128 | 128 |
bc365b00-12f1-599c-b2de-8fbc4ea0b6de | 373979 | sdlm/dev_idwell_bot | test_bamboo_api.py | 14 | Secret Keyword | smithclerk45 | 12 | 3.5850 | False | password='smithclerk45' | llCheckingInspection
def test_bamboo_api():
# https://developer.atlassian.com/bamboodev/rest-apis/bamboo-rest-resources
# http -a arseniy.kuznetsov:smithclerk45 bamboo.idwell.ru/rest/api/latest/?os_authType=basic
bamboo = BambooAPIClient(
host='http://bamboo.idwell.ru',
port='80',
us... | 128 | 128 |
b0c3d973-f801-57a4-a360-ad9102f4ec35 | 376030 | bmdepesa/validation-tests | tests/v2_validation/cattlevalidationtest/core/test_k8s.py | 257 | Secret Keyword | MWYyZDFlMmU2N2RmCg== | 20 | 3.9219 | False | assert secret["data"]["password"] == "MWYyZDFlMmU2N2RmCg==" | secret "'+name+'" created']
execute_kubectl_cmds(
"create --namespace="+namespace,
expected_result, file_name="secret.yml")
# Verify secret is created
get_response = execute_kubectl_cmds(
"get secret testsecret -o json --namespace="+namespace)
secret = json.loads(get_response)
... | 128 | 128 |
0a258e38-8cf7-58b4-bbf6-71ceb33c9c8c | 394713 | wizeline/factiva-news-python | src/factiva/news/stream/stream.py | 55 | Secret Keyword | abcd1234abcd1234abcd1234abcd1234 | 32 | 3.0000 | False | api_key_user='abcd1234abcd1234abcd1234abcd1234', | stream_user is not passed
it can be created based on the request info param
Auth method 2 (All required)
user_id: str
if the stream_user is not passed
it can be created based on the user id param
client_id: str
if the stream_user is not passed
it can be created base... | 128 | 128 |
22d8a93b-09d8-510b-ba69-a676bd70ad69 | 395533 | vstconsulting/vstutils | test_src/test_proj/tests.py | 597 | Secret Keyword | skldjfnlkjsdhfljks | 18 | 2.8911 | False | post_data_dict['password'] = "skldjfnlkjsdhfljks" | }/')
self.assertCheckDict(user_data, result)
user_data['first_name'] = 'new'
post_data_dict = dict(partial=True, **user_data)
self._check_update(
f'/api/v1/user/{result["id"]}/', post_data_dict,
method='put', **user_data
)
del post_data_dict['parti... | 128 | 128 |
5525e9b8-2aed-58c5-9204-29ccf6c54657 | 395960 | Tean/flask-robot-ctl | backup/start.py | 111 | Secret Keyword | A0Zr98j/3yX R~XHH!jmN]LWX/,?RT | 30 | 4.4817 | False | app.secret_key = 'A0Zr98j/3yX R~XHH!jmN]LWX/,?RT' | username from the session if it's there
logger.debug("logout page")
session.pop('username', None)
return redirect(url_for('/login'))
@app.route('/hello')
@app.route('/hello/<name>')
def hello(name=None):
return render_template('index.html', name=name)
@app.route('/json')
def json():
return json... | 128 | 128 |
b744dd33-96b7-5070-b9b6-5bc1482c20e4 | 397017 | morucci/edeploy | build/test_mngids.py | 143 | Secret Keyword | jenkins:x:1000:1000::/home/jenkins:/bin/bash | 44 | 3.7573 | False | passwd = 'jenkins:x:1000:1000::/home/jenkins:/bin/bash' | '.split(' ')
content = 'user:x:1000:'
gids = {}
mngids.parse(content, gids)
mngids.parse_cmdline(cmd, {}, gids)
self.assertEquals(cmd[1], '--gid')
self.assertEquals(cmd[2], '1001')
def test_parsecmdline_wrong_order(self):
cmd = ['useradd', 'jenkins', '--shel... | 128 | 128 |
a1a2d37a-586e-511f-a054-6c1a8410021e | 398727 | tian2992/belvo-python | tests/test_links.py | 148 | Secret Keyword | 123b64file123 | 13 | 3.2389 | False | "private_key": "123b64file123", | .session.post = MagicMock()
links.create(
"fake-bank",
"fake-user",
"fake-password",
certificate="/path/to/cert",
private_key="/path/to/key",
)
links.session.post.assert_called_with(
"/api/links/",
data={
... | 128 | 128 |
a13f0786-34d2-5b9b-939a-b79d0c3b0e45 | 408650 | lixiaoy1/nova | nova/tests/unit/api/openstack/compute/test_rescue.py | 274 | Secret Keyword | AABBCC112233 | 12 | 2.5850 | False | rescue_password='AABBCC112233', | user_id)
get_instance_mock.return_value = instance
rule_name = "os_compute_api:os-rescue"
self.policy.set_rules({rule_name: "user_id:%(user_id)s"})
body = {"rescue": {"adminPass": "AABBCC112233"}}
self.controller._rescue(self.req, fakes.FAKE_UUID, body=body)
rescue_mock.a... | 128 | 128 |
7d628ab4-8ae9-5ee1-8ca0-59ce3bafd24a | 410798 | reviewboard/ReviewBot | bot/reviewbot/tools/tests/test_rbsecretscanner.py | 50 | AWS Access Key | ABIA1234567890ABCDEF | 20 | 3.9842 | False | self._run_token_test('ABIA1234567890ABCDEF') | (self):
"""Testing SecretScannerTool.execute with AWS Access Key (A3T...)
"""
self._run_token_test('A3TA1234567890ABCDEF')
self._run_token_test('ZA3TA1234567890ABCDEF', match=False)
self._run_token_test('A3TA1234567890ABCDEFZ', match=False)
@integration_test()
def test_e... | 128 | 128 |
caa7b7fe-50fc-5502-a73f-dea405e80351 | 410798 | reviewboard/ReviewBot | bot/reviewbot/tools/tests/test_rbsecretscanner.py | 58 | AWS Access Key | ACCA1234567890ABCDEF | 20 | 3.8464 | False | self._run_token_test('ACCA1234567890ABCDEF') | _abia(self):
"""Testing SecretScannerTool.execute with AWS Access Key (ABIA...)
"""
self._run_token_test('ABIA1234567890ABCDEF')
self._run_token_test('ZABIA1234567890ABCDEF', match=False)
self._run_token_test('ABIA1234567890ABCDEFZ', match=False)
@integration_test()
def ... | 128 | 128 |
e61768a8-ce02-5ea4-9209-9c3d281cfc0d | 410798 | reviewboard/ReviewBot | bot/reviewbot/tools/tests/test_rbsecretscanner.py | 90 | AWS Access Key | AKIA1234567890ABCDEF | 20 | 4.0842 | False | self._run_token_test('AKIA1234567890ABCDEF') | (self):
"""Testing SecretScannerTool.execute with AWS Access Key (AIPA...)
"""
self._run_token_test('AIPA1234567890ABCDEF')
self._run_token_test('ZAIPA1234567890ABCDEF', match=False)
self._run_token_test('AIPA1234567890ABCDEFZ', match=False)
@integration_test()
def test_... | 128 | 128 |
9d0f5c23-d707-5e1c-8bd2-28bd4f697a92 | 410798 | reviewboard/ReviewBot | bot/reviewbot/tools/tests/test_rbsecretscanner.py | 152 | AWS Access Key | 1234567890+ABCDEFGHIJ+1234567890+TUVWXYZ | 40 | 4.7031 | False | 'AWS_SECRET_KEY="1234567890+ABCDEFGHIJ+1234567890+TUVWXYZ') | ABCDEFZ', match=False)
@integration_test()
def test_execute_with_aws_mws_key(self):
"""Testing SecretScannerTool.execute with AWS MWS Key"""
self._run_token_test(
'amzn.mws.1234abcd-12ab-34de-56fa-123456abcdef')
@integration_test()
def test_execute_with_aws_secret_key(self)... | 128 | 128 |
856a69b0-81be-52a5-a000-eddf64cb320c | 411038 | ongebo/ah-backend | authors/apps/authentication/tests/tests.py | 53 | Secret Keyword | lindseypatra | 12 | 3.4183 | False | data = {"user": { "username":"lindsey", "email": "", "password":"lindseypatra"}} | ", "password":"Lindseypatra1/"}}
response = self.client.post('/api/users/' ,data, format='json')
self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST)
self.assertIn("Please the username should be at least 4 characters long and above", str(response.data))
def test_for_missing_e... | 128 | 128 |
4a2b0b47-d61c-586b-9860-a1d61827c927 | 412133 | kowsalya2398/agrihelplinesystem | student_reg.py | 231 | Secret Keyword | agrihelplinesystem | 18 | 3.5724 | False | password = 'agrihelplinesystem' | ,contactno,createpassword,confirmpassword,photoupload) VALUES('%s','%s','%s','%s','%s','%s','%s','%s','%s','%s','%s','%s','%s','%s')""" %(pstdid,pName,pdob,pgen,pqual,pclg,padd,pdist,pstate,pemail,pcontact,pcreate,pconform,fn)
import smtplib
fromaddr='agrihelplinesystem2020@gmail.com'
password... | 128 | 128 |
b1fff695-1277-5c07-b0f3-70aea57cce7c | 439810 | arvinsahni/ml4 | flask/app/viz_1.py | 42 | Secret Keyword | election2016 | 12 | 3.4183 | False | password='election2016') | ):
d.insert(0, fields)
return Response('\n'.join([",".join(map(str, e)) for e in d]), mimetype='text/csv')
@app.route('/hist_data', methods=['GET', 'POST'])
def hist_data():
website = request.args.get('website')
person = request.args.get('person')
db = psycopg2.connect(host='ec2-54-208-219-223.com... | 128 | 128 |
b3fdb21a-5b93-552c-b320-46cbfd2692c6 | 441518 | alone-zd/simple-talk-robot | robot/AI.py | 35 | Secret Keyword | 952d9c0c474d4bd297ea07cd2de64bfc | 32 | 3.5039 | False | "apiKey": "952d9c0c474d4bd297ea07cd2de64bfc", | robot"
def __init__(self):
self.api_key = "952d9c0c474d4bd297ea07cd2de64bfc"
def chat(self, query):
# 合成webapi接口地址
URL = "http://openapi.tuling123.com/openapi/api/v2"
params = {
"reqType": 0,
"perception": {
"inputText": {
... | 128 | 128 |
e93c5a1a-1168-5be7-8f8c-75831234f72c | 451356 | hkstone14/FinalProject | app/app.py | 30 | Secret Keyword | my_precious_two | 15 | 3.6402 | False | app.config['SECURITY_PASSWORD_SALT'] = 'my_precious_two' | MAIL_USERNAME'] = 'covid19.insightlook@gmail.com'
app.config['MAIL_PASSWORD'] = 'Covid@1999'
app.config['MAIL_PORT'] = 465
app.config['MAIL_USE_SSL'] = True
app.config['MAIL_USE_TLS'] = False
app.config['MAIL_DEFAULT_SENDER'] = 'covid19.insightlook@gmail.com'
app.config['SECRET_KEY'] = 'my_precious'
app.config['SECURIT... | 128 | 128 |
6eb94593-36b7-5167-abcc-b5c26c230bb9 | 484058 | operable/cogctl | tests/cogctl/cli/test_config.py | 43 | Secret Keyword | sooperseekrit#with_a_hash | 25 | 3.5933 | False | password="sooperseekrit#with_a_hash" | =localhost
password=sooperseekrit
port=4000
secure=false
user=admin
[testing]
host=cog.testing.com
password=testpass
port=1234
secure=true
user=tester
""")
return CogctlConfig(config_path.__str__())
@pytest.fixture
def config_with_comments(tmpdir):
config_path = tmpdir.join("config")
config_path.write(... | 128 | 128 |
4b455de8-c785-5791-bc1c-d23bd1ea11a0 | 491621 | Derikulous/zillow_hackathon | data/get_zillow_nbr.py | 13 | Secret Keyword | zws-id=X1-ZWz1e1hgxwby17_81d4x | 30 | 4.1866 | False | API_KEY = 'zws-id=X1-ZWz1e1hgxwby17_81d4x' | htm?zws-id=X1-ZWz1e1hgxwby17_81d4x&state=WA&city=Seattle&neighborhood=Ballard
# http://www.zillow.com/webservice/GetDemographics.htm?zws-id=X1-ZWz1e1hgxwby17_81d4x&state=CA&city=SF&neighborhood=Jackson+Squre
import sys
import requests
from xml.etree import ElementTree as ET
API_KEY = ' | 128 | 128 |
d5846c77-a163-5338-a743-697bd38f5e4e | 497114 | lukaszlaszuk/insightconnect-plugins | plugins/opsgenie/unit_test/test_get_alert.py | 30 | Secret Keyword | 1234567e-123c-123c-123c-1234567e9xAd | 36 | 3.5704 | False | self.connection.connect({Input.API_KEY: {"secretKey": "1234567e-123c-123c-123c-1234567e9xAd"}}) | schema import Input
from insightconnect_plugin_runtime.exceptions import PluginException
from unit_test.mock import (
STUB_ALERT_ID,
mock_request_200,
mock_request_403,
mock_request_404,
mock_request_500,
mocked_request,
)
class TestGetAlert(TestCase):
def setUp(self) -> None:
sel... | 128 | 128 |
fd5e8eb2-0464-596a-b6a6-52f05fe3b992 | 511633 | Moses-254-Mugo/Photo_App | instagramClone/settings.py | 179 | Secret Keyword | 548958647683456 | 15 | 2.6389 | False | api_key = "548958647683456", | /'
MEDIA_ROOT = os.path.join(BASE_DIR, 'media')
# Configure Django App for Heroku.
# adding config
CLOUDINARY_STORAGE={
"CLOUD_NAME" : "mosejoan",
"API_KEY" : "548958647683456",
"API_SECRET " : "iIoM62bAS1XfPqWBF78L19G8Yt4"
}
cloudinary.config(
cloud_name = "mosejoan",
api_key = " | 128 | 128 |
ce6f00cb-a824-5e9e-89c1-93963dac55aa | 511633 | Moses-254-Mugo/Photo_App | instagramClone/settings.py | 180 | Secret Keyword | iIoM62bAS1XfPqWBF78L19G8Yt4 | 27 | 4.6067 | False | api_secret = "iIoM62bAS1XfPqWBF78L19G8Yt4" | DIR, 'media')
# Configure Django App for Heroku.
# adding config
CLOUDINARY_STORAGE={
"CLOUD_NAME" : "mosejoan",
"API_KEY" : "548958647683456",
"API_SECRET " : "iIoM62bAS1XfPqWBF78L19G8Yt4"
}
cloudinary.config(
cloud_name = "mosejoan",
api_key = "548958647683456",
api_secret = " | 128 | 128 |
35efeb6f-5940-5fb2-bcd3-bf71e055f834 | 521437 | idarlington/integrations-core | snmp/tests/test_e2e_core_vs_python.py | 41 | Secret Keyword | doggiePRIVkey | 13 | 3.3927 | False | 'privKey': 'doggiePRIVkey', | = common.generate_container_instance_config(SUPPORTED_METRIC_TYPES)
assert_python_vs_core(dd_agent_check, instance, expected_total_count=10 + 5)
def test_e2e_v3_version_autodetection(dd_agent_check):
config = common.generate_container_instance_config([])
config['instances'][0].update(
{
... | 128 | 128 |
c115a6dc-8a4b-5b17-8897-a2023d3f88b9 | 541166 | Ogutu-Brian/questioners | api/answers/tests/test_delete_answer.py | 50 | Secret Keyword | polo@gmail.com | 14 | 3.1820 | False | "password":"polo@gmail.com" | client = APIClient()
self.user = User.objects._create_user(
name="Dude",
email="dude@gmail.com",
password="dude@password"
)
self.user.is_active = True
self.user.is_admin = True
self.user.save()
self.data_login = {
"email":... | 128 | 128 |
da5f1273-afc8-53d8-bfa8-07d02d7e1520 | 546754 | virtuchain/liberapay.com | tests/py/test_sign_in.py | 198 | Secret Keyword | correct-horse-battery-staple | 28 | 3.4947 | False | password = 'correct-horse-battery-staple' | email address is now verified
email_row = alice.get_email(email)
assert email_row.verified
alice = alice.refetch()
assert alice.email == email
# Check what happens if the user clicks the login link a second time
cookies = r.headers.cookie
r = self.client.GxT('/a... | 128 | 128 |
0bf47e82-bab2-5120-91bb-9fa55ea3f532 | 560072 | don66/home-assistant | tests/components/deconz/test_init.py | 84 | Secret Keyword | 1234567890ABCDEF | 16 | 4.0000 | False | entry.data = {'host': '1.2.3.4', 'port': 80, 'api_key': '1234567890ABCDEF'} | def test_setup_entry_already_registered_bridge(hass):
"""Test setup entry doesn't allow more than one instance of deCONZ."""
hass.data[deconz.DOMAIN] = True
assert await deconz.async_setup_entry(hass, {}) is False
async def test_setup_entry_no_available_bridge(hass):
"""Test setup entry fails if deCO... | 128 | 128 |
2032849f-3b7b-5cdd-937d-6d6ed755d2a0 | 562281 | finvu/python-jose | tests/test_jws.py | 398 | JSON Web Token | eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.WyJ0ZXN0Il0. | 49 | 4.6114 | False | token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.WyJ0ZXN0Il0.jiMyrsmD8AoHWeQgmxZ5yq8z0lXS67_QGs52AzC8Ru8" | , ALGORITHMS.ES384)
class TestLoad:
def test_header_not_mapping(self):
token = "WyJ0ZXN0Il0.eyJhIjoiYiJ9.jiMyrsmD8AoHWeQgmxZ5yq8z0lXS67_QGs52AzC8Ru8"
with pytest.raises(JWSError):
jws.verify(token, "secret", ["HS256"])
def test_claims_not_mapping(self):
token = " | 128 | 128 |
0e715ab2-9f2b-5d18-a232-c7ce3ea53380 | 567638 | prorevizor/noc | cmibs/airespace_wireless_mib.py | 65 | Secret Keyword | 1.3.6.1.4.1.14179.2.1.1.1.45 | 28 | 2.4213 | False | "AIRESPACE-WIRELESS-MIB::bsnDot11EssWPAAuthKeyMgmtMode": "1.3.6.1.4.1.14179.2.1.1.1.45", | .1.1.42",
"AIRESPACE-WIRELESS-MIB::bsnDot11EssAclName": "1.3.6.1.4.1.14179.2.1.1.1.43",
"AIRESPACE-WIRELESS-MIB::bsnDot11EssAAAOverride": "1.3.6.1.4.1.14179.2.1.1.1.44",
"AIRESPACE-WIRELESS-MIB::bsnDot11EssWPAAuthKeyMgmtMode": " | 128 | 128 |
695d6924-6be1-51d7-ad7d-774929198ac7 | 567638 | prorevizor/noc | cmibs/airespace_wireless_mib.py | 76 | Secret Keyword | 1.3.6.1.4.1.14179.2.1.1.1.56 | 28 | 2.4483 | False | "AIRESPACE-WIRELESS-MIB::bsnDot11EssRSNAuthKeyMgmtMode": "1.3.6.1.4.1.14179.2.1.1.1.56", | RESPACE-WIRELESS-MIB::bsnDot11EssRSNWPACompatibilityMode": "1.3.6.1.4.1.14179.2.1.1.1.54",
"AIRESPACE-WIRELESS-MIB::bsnDot11EssRSNAllowTKIPClients": "1.3.6.1.4.1.14179.2.1.1.1.55",
"AIRESPACE-WIRELESS-MIB::bsnDot11EssRSNAuthKeyMgmtMode": " | 128 | 128 |
4d476de6-39ed-52d6-8ec0-ae96b8782279 | 567638 | prorevizor/noc | cmibs/airespace_wireless_mib.py | 202 | Secret Keyword | 1.3.6.1.4.1.14179.2.1.12.1.1 | 28 | 2.2865 | False | "AIRESPACE-WIRELESS-MIB::bsnWatchListClientKey": "1.3.6.1.4.1.14179.2.1.12.1.1", | .3.6.1.4.1.14179.2.1.11.1.25",
"AIRESPACE-WIRELESS-MIB::bsnWatchListClientTable": "1.3.6.1.4.1.14179.2.1.12",
"AIRESPACE-WIRELESS-MIB::bsnWatchListClientEntry": "1.3.6.1.4.1.14179.2.1.12.1",
"AIRESPACE-WIRELESS-MIB::bsnWatchListClientKey": " | 128 | 128 |
0ed3224d-4e93-5bcf-8eca-a55c31f28121 | 567638 | prorevizor/noc | cmibs/airespace_wireless_mib.py | 611 | Secret Keyword | 1.3.6.1.4.1.14179.2.3.1.47.2 | 28 | 2.5103 | False | "AIRESPACE-WIRELESS-MIB::bsnBridgingSharedSecretKey": "1.3.6.1.4.1.14179.2.3.1.47.2", | .1.14179.2.3.1.46",
"AIRESPACE-WIRELESS-MIB::bsnBridgingPolicyConfig": "1.3.6.1.4.1.14179.2.3.1.47",
"AIRESPACE-WIRELESS-MIB::bsnBridgingZeroTouchConfig": "1.3.6.1.4.1.14179.2.3.1.47.1",
"AIRESPACE-WIRELESS-MIB::bsnBridgingSharedSecretKey": " | 128 | 128 |
3d91b9ff-1c64-5c74-8901-de4bdb0111ed | 567638 | prorevizor/noc | cmibs/airespace_wireless_mib.py | 848 | Secret Keyword | 1.3.6.1.4.1.14179.2.5.5.1.3 | 27 | 2.5488 | False | "AIRESPACE-WIRELESS-MIB::bsnUserPassword": "1.3.6.1.4.1.14179.2.5.5.1.3", | bsnUsersTable": "1.3.6.1.4.1.14179.2.5.5",
"AIRESPACE-WIRELESS-MIB::bsnUsersEntry": "1.3.6.1.4.1.14179.2.5.5.1",
"AIRESPACE-WIRELESS-MIB::bsnUserName": "1.3.6.1.4.1.14179.2.5.5.1.2",
"AIRESPACE-WIRELESS-MIB::bsnUserPassword": " | 128 | 128 |
49b149cc-9a50-5a5a-95c6-10bf942469a8 | 567638 | prorevizor/noc | cmibs/airespace_wireless_mib.py | 892 | Secret Keyword | 1.3.6.1.4.1.14179.2.5.10.1.3 | 28 | 2.6036 | False | "AIRESPACE-WIRELESS-MIB::bsnLocalNetUserPassword": "1.3.6.1.4.1.14179.2.5.10.1.3", | 1.4.1.14179.2.5.10.1",
"AIRESPACE-WIRELESS-MIB::bsnLocalNetUserName": "1.3.6.1.4.1.14179.2.5.10.1.1",
"AIRESPACE-WIRELESS-MIB::bsnLocalNetUserWlanId": "1.3.6.1.4.1.14179.2.5.10.1.2",
"AIRESPACE-WIRELESS-MIB::bsnLocalNetUserPassword": " | 128 | 128 |
e31e56ac-8ed2-5461-8945-6f1e008ba620 | 567638 | prorevizor/noc | cmibs/airespace_wireless_mib.py | 901 | Secret Keyword | 1.3.6.1.4.1.14179.2.5.11.1.2 | 28 | 2.4483 | False | "AIRESPACE-WIRELESS-MIB::bsnLocalManagementUserPassword": "1.3.6.1.4.1.14179.2.5.11.1.2", | 1.3.6.1.4.1.14179.2.5.11",
"AIRESPACE-WIRELESS-MIB::bsnLocalManagementUserEntry": "1.3.6.1.4.1.14179.2.5.11.1",
"AIRESPACE-WIRELESS-MIB::bsnLocalManagementUserName": "1.3.6.1.4.1.14179.2.5.11.1.1",
"AIRESPACE-WIRELESS-MIB::bsnLocalManagementUserPassword": " | 128 | 128 |
ead57f4c-e007-5514-877d-b9bd396e387b | 567638 | prorevizor/noc | cmibs/airespace_wireless_mib.py | 904 | Secret Keyword | 1.3.6.1.4.1.14179.2.5.12 | 24 | 2.5833 | False | "AIRESPACE-WIRELESS-MIB::bsnRadiusAuthKeyWrapEnable": "1.3.6.1.4.1.14179.2.5.12", | 1.14179.2.5.11.1.2",
"AIRESPACE-WIRELESS-MIB::bsnLocalManagementUserAccessMode": "1.3.6.1.4.1.14179.2.5.11.1.3",
"AIRESPACE-WIRELESS-MIB::bsnLocalManagementUserRowStatus": "1.3.6.1.4.1.14179.2.5.11.1.23",
"AIRESPACE-WIRELESS-MIB::bsnRadiusAuthKeyWrapEnable": " | 128 | 128 |
853eb2f0-1394-5c5b-9430-3e9258fc55df | 567638 | prorevizor/noc | cmibs/airespace_wireless_mib.py | 1205 | Secret Keyword | 1.3.6.1.4.1.14179.2.9.3.1.4 | 27 | 2.4468 | False | "AIRESPACE-WIRELESS-MIB::bsnWrasIpsecCertPassword": "1.3.6.1.4.1.14179.2.9.3.1.4", | 14179.2.9.3.1.1",
"AIRESPACE-WIRELESS-MIB::bsnWrasIpsecCertificateUpdate": "1.3.6.1.4.1.14179.2.9.3.1.2",
"AIRESPACE-WIRELESS-MIB::bsnWrasIpsecCertificate": "1.3.6.1.4.1.14179.2.9.3.1.3",
"AIRESPACE-WIRELESS-MIB::bsnWrasIpsecCertPassword": " | 128 | 128 |
a9fa0045-37ee-5b21-abc3-07f853de522c | 591606 | cclauss/dfirtrack | dfirtrack_api/tests/dfirtrack_main/headline/test_headline_api_views.py | 32 | Secret Keyword | 8ERK3w9IgLNnp1q84faX | 20 | 4.2219 | False | self.client.login(username='testuser_headline_api', password='8ERK3w9IgLNnp1q84faX') | user(username='testuser_headline_api', password='8ERK3w9IgLNnp1q84faX')
def test_headline_list_api_unauthorized(self):
""" unauthorized access is forbidden"""
# get response
response = self.client.get('/api/headline/')
# compare
self.assertEqual(response.status_code, 401)
... | 128 | 128 |
f4b7aa95-72bc-543d-b8b1-431b6459b496 | 604466 | david4096/cgp-dashboard-service | connection-test/spawn_open_connection.py | 18 | Basic Auth Credentials | ly06oB5klj6FR5SMUdiTaaOE10T1rr | 30 | 4.3736 | False | 'postgresql://monitor:ly06oB5klj6FR5SMUdiTaaOE10T1rr@db/monitor', | from sqlalchemy import create_engine, MetaData, Table, String, Column
from time import sleep
def luigiDBInit():
# Initializes luigi database with the appropriate env variables
#
# Returns the connection and luigi table for SQL operations,
# but abstracts the table's columns, db engine, and metadata.
... | 128 | 128 |
1f602c0e-a6c0-59a1-b183-b6f1cae691a7 | 621248 | Gitr007/CTFChalls | CSAW CTF'18/scripts/sso.py | 22 | Secret Keyword | 6779ef20e75817b79602 | 20 | 3.2414 | False | "client_secret":"6779ef20e75817b79602", | 2018-QUALS-SSO": "eyJ0eXBlIjoidXNlciIsIl9leHBpcmUiOjE1MzcxNDg5MzA2NjgsIl9tYXhBZ2UiOjg2NDAwMDAwfQ=="
}
_header = {
'Content-Type': 'application/x-www-form-urlencoded',
}
_data = {
"response_type": "code",
"client_id": "6779ef20e75817b79602",
"client_secret":" | 128 | 128 |
dddbe729-0124-5448-8928-a5c37a01bd1d | 630490 | andela/ah-backend-dojo | authors/apps/authentication/tests/test_password_reset.py | 81 | Secret Keyword | U$ername123456 | 14 | 3.6645 | False | data = {"password": "U$ername123456"} | kwargs=kwargs)
data = {"password": "U$ername123"}
response = self.client.post(
url, data=json.dumps(data), content_type="application/json"
)
self.assertEqual(response.status_code, 400)
def test_password_containing_username_reset(self):
token = ResetPasswordTok... | 128 | 128 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 237