beam-training-data / synthetic /hard_safe_configs.jsonl
idobrovolskyi's picture
Upload synthetic/hard_safe_configs.jsonl with huggingface_hub
a406b71 verified
{"id": "hard_safe_configs_00000", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00001", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00002", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n7ca6b77866603f3088f3e071c9270a58e208acd637ea8ae8906e6ca8e294d584\n5e6ca924a97901884b9e5b4879fc4f34e56bea623a80bb60e99a4a8b0b72fcbd\n72bd80f1c58a3b31df175f494b3d787b0a9628de74e40174f29b856a55d25c62\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00003", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00004", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00005", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByk+ANcQg/qokT7JQH/NZ1QMyjPqPVlABfozFPd6mPftXkjoxPcUjB32OcZeMc6fdgz1LuvtUcg432iVFt\n db_pass: AgCxWSZaPlTvRK7D7mF9kAz05KgVdIQWehFn6ajcbrjDAYp1PWAiBRw2+s4RqfAk\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00006", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00007", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00008", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIABFF875A8E9B0BAE2\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-c8cec0d6fb0a-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00009", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00010", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByDrPsoTjSwDB6FPsTs2EDqOzrNj3VGQsKaC5QecKJslGLpyqhGBG9EX93lHevxKKx2Hqq/5whjXs6rTDb\n db_pass: AgCxXAPeULNsuCVPrubE/UhHegezOgQfqX+GnD+dd2CN8UO7ynClqQW/ivj9FHqF\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00011", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByG/VPC7FQk+mLB1yZZtrgRLR+6CTKHzjMgZwuUuEs2IVFgPVmn+C8oYntF54NBgDxdhbbcFBQXw0H63DX\n db_pass: AgCxwO8o5dPAgSvnF5/nUDK0k39s1ylzGNufVwQWnF2buMUtPqMZZLKQuR+WPlqm\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00012", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n09edc7ad7ea65a0ae21ecf187f794d56e9cbacfb04401f657b76ace5732a74c5\n650cb30ce6b1badddf5de3d03e48078ad23ec6501d6193d75017daa7639f60e6\n079dd2d80a78b7988435686af748f3df97e4d951fdc372a157bf48e24d49dcda\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00013", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByfYdrOQYQxKOEIYhPNxGepZZb5MtUsqXRIvMoqjJ4/T+NRB1MbG/9dB7e9s3BO3ygWR1r+A3d+vH+JrRq\n db_pass: AgCxPFR+uEsaomxVHACLMljtt7APgr9wGn/eKfi3zn71+CWSEIK2kGpQxxmrIlpO\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00014", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00015", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00016", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00017", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00018", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByzrg93gNWxx+k7EaWNpD50j+orqjVKZEKB8kamobAqSXUc5Yk5c2IHlVHVK3VbBWOxGDnbdwiRAW7Q+/x\n db_pass: AgCxbfmi8V/ntg5s8EvySGRnFpCLIabZ+vGILVeljYoQNZvSxmPYyZvkuy8jI4nr\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00019", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00020", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nac29b1878e6e69a941fa88226f8b0b757cc3aa59aa62aa6425889c0f88cec81e\n74be363f885884c3d2136cbfd38fc19a8c3eb097f5c8c288f18b421fe1269763\n23271c0232d88d892604627e1e193e0e19dc16a28037009ee190dc66d36e7e2a\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00021", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n5b986d3ae3f51622f0d9613e51b53a063dedd2f71d5a6530c3ff543158b08126\n5148a45fc34afd5bbf6ba08ce03065989609dc0f1f92d7ac41622a8ffba58bad\nac220dff103c54644cbbb1eef51495ff0aefb57f6e272461f99f4084640d6710\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00022", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00023", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00024", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00025", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00026", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00027", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00028", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00029", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00030", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAA1416F8E5E7406F7\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-0c42133c96a1-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00031", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00032", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00033", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00034", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00035", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00036", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00037", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00038", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00039", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n6bdf67d65045b1de4cd995ee92608ac13a2a23fabc598fd9d05839f0d3f7eb8c\n3e4167c9bd9ab5de9057fc5b06ffe3763a3ce5c665e992627243c3d99f565c1e\n133e6a3fc7c8ab05b11c24d634a781f8443d716861b46e0377c351d55ed7e3ac\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00040", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00041", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00042", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00043", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00044", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA7B0D89331858F156\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-8fec41a0f246-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00045", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00046", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00047", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00048", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00049", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBynSc8InZ1fKSHm6WLmVavPa5HVrhfsALUmSAZnoUP4kFSJJx5QlSIclmFAPpt6EHzjFMak6RHevbLAIlG\n db_pass: AgCxpNoPvOoWdJj9lC9gBwLpXLUp9lCO0A3fB41Xk/0yJeKycfTej4asg/3cJWiJ\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00050", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n8637a8b73cc76bf3eaab6996c4b943e6ba7d5ce8557be529f868ace34892ce64\n452d6a2fc25f8eecbf76c90d8df47129df86518c1d7fddb3ca390ac92e1f5554\n6a8faaacc6d553bcd1900661ecda3160b4b679843be6977d56084f65382a9966\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00051", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00052", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00053", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByWHcgOm+8HqgZy643N3kVM4MSs8ekYr2u1MM6Evy2WF8dP8w3+CeRgYspFEyFxLSmi8rMEDLEvC+ZbMvQ\n db_pass: AgCx7INS5n7HyLzrhRyrIBG/z3HEBKf9hSucUNNRYqrDCxrUEAdvDPJrdufNN7ya\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00054", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByI+8buHMSRbPxFD5EbmPN1Mlu9CN//StRzpWEEHlACWHe5YWzYhamVAt0HtNzx0KCXot9Z09PsiPydIce\n db_pass: AgCxlHpqGI6YL0w2uswHNMcfknf5it85huDGrZDH+fZE0U1Vmppv8N5bJquzyA0Q\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00055", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00056", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00057", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00058", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00059", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n1381ae7326d3a6be4b2a0c8b6a640dfc9b89eadf5d42af6d8dca7f1ccf4bcd3c\nc741d55ee24ca54b109aa19c59375c3544f94ec8b4092ec15ef83e5300cac329\ne2eac55efde4765e83f3394195f8577ec8da97bd373a1965ada4cabdc56aa67e\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00060", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00061", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBygIOCH0dL3Qcv+6cz564+nbzqIEFNctY0XaEOKfINRhlWWFlRPVNO75fO+AAE/FKwCAiSbp95WmPeyOHl\n db_pass: AgCxv/7d9sZyySncyZj2pzii/yV/EcdzB9p6H4kqIcDZbQEZ1UUPDVXrORVIxWCb\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00062", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAC3AD59B4791FDCB9\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-abf88d530053-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00063", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\ne09807006c545cc64bf3217dda0d527fffad8ecb4edaa8bbe12504e0face217b\n8081fa766351263a10ce8866b44e59485a4227e8da77ca91a632a37d1a09bfac\nc5f196ab204e2b6b5f9baa3c846efdaec68c1bb6ac3f90fa3e49658be79ef374\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00064", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n16618b39449363479f2d1a8985822731e51af87f30c9fb4f6bd26985c627115a\na447bd00c7abf7688183267c398ad242dc81daec47b56c1a91a4cd9aead8af54\n8e0171efbe685d9d1749f08a0ce8b2ad41968429742657202866f00090ddc803\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00065", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00066", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00067", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA72FDBACAA0C370D1\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-c922d96a251d-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00068", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00069", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00070", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByaX5DiQ1St0jJnI2tk4mL50FPNwfNXV8x2GD95PqPP0gBQbu6FnSjArLQdYR0NeDuQPlM6NUgvqIZJNhO\n db_pass: AgCxGvHIELcc3AJX+wIb4Q/1JQwZf5snWQuuj6iw0SxOGSJBMagSJin2rlN+sEci\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00071", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00072", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00073", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00074", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00075", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy5trBNx9S51IFDp5dRnCQM8gYdT1pPtXfaqXcjmu3Ewp+0/XW72y9xwiGJ84xUBy/GHQt+Eodlwzq2pCG\n db_pass: AgCxiqOGsa0StcQyWEB6P2HLPmP2xNurlHgm4PsNN24UfagSCYs0y1I+3HMC/oAX\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00076", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByqM+tESHLTAzVSHEDtUHdsfNOkeS1VObuQiAxSFd6/I77NI9CKx3gkHoFp3gHSw6gVW/uTmZSdVsuF6X/\n db_pass: AgCxZDXv6si0mFdnDO9iVcyX2y1rnRaP9V+nUzezlZQFZvgU4rOU82gimyGcUYtx\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00077", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00078", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00079", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00080", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA5A2205B5D3CEFF90\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-5897d248058e-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00081", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA3553588243978680\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-55b3d387ff66-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00082", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n04e51c06d5599f06869dbb222406b9ddd7db3c51acdf20d81d38aec4b2452492\n32bc0037f2a2a5ad9b33256a769eb4bc4e8fdd7e31480796e30731f6d21be322\n5987778bb381692ffd3b18e225f6709bed0b1414e2f4570aa3beb54eb93a71ed\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00083", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA388F59BC95C9B579\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-0b2c73ba078d-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00084", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00085", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00086", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n84a4bc29435ad0a62d7fe02da5ca4acb0c5b241666a0a940567364dd53b05db2\n61f40aecd75eb3195d63e9e5bfb2f2d694807a648ad0fb710102ff806af1b7ba\n0410fb7bbbce2093b604200da305c35875606f511851691be7a1c81f11b2bd4c\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00087", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA401DF04B7F51B771\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-2750a4db408b-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00088", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00089", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00090", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00091", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00092", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAD610EB931DFFB40C\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-982b9f1c2bc2-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00093", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy2teT3qjwOtvczqlp7BMzBrefv8kOi4jrbBENoyDeFG5qdNowT3oVgwKdlpBfTPbC+jZuhiP3dR6ALX+2\n db_pass: AgCxbrRNVlP8E5nAXA4n0M+czz/BYvbPPv6RdnANxSLGc+957teKseinedalO8Nc\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00094", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00095", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00096", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00097", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00098", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n986893d179f11775ffc4d5db1d5fde908d6ef0646de753cfe3af73e78270d071\n00ac023ed69995b8c1610e4494c4ae61f2bfbe215ccf26b2ad6b9eb96864f933\n9f5ef82886c44bdace6a0f055c7463834b02e27e5d4ba5ce2c6608900f65e7ab\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00099", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00100", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00101", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00102", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00103", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00104", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA85BEA445BE83E34F\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-f90149609653-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00105", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAD5E00EC104876058\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-cce3fc192fb5-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00106", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00107", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA37847E4E0C482D9D\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-0b087d505f5c-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00108", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00109", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00110", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA67364F715DDB2561\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-4ecbf4345727-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00111", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00112", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByEdyq6bFqfybUdUjAGm2vM61CpZJEyqit/Wshmr4XIYAw0X9loQEyDWv0aXL9W+pCNvzt8ldLCv4FzGTm\n db_pass: AgCxQX2a8UDX3kCrpI5j3C2wSoPPrb0NQ5pur2ZdN/q4WtBHS4N9OcTz418lkCDh\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00113", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByJmYIvA1zeFyEfVUmsS+5K1zAXhkVQNIUPB4z7eitKOlqz+7BcRg1frQwNvISmujG+bNseXpvis10ge4H\n db_pass: AgCxllehKffMa0BEBQm3nYz3uJm4kuaoxp6V90fgvtzu2eLQwK2CcgZaBQiJler7\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00114", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00115", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n5cdcd98cf666d4abe81ae3267320dc4d92921927fac56a829b821208b93cfee1\necfa554f18cbf8f0bd0fabd81b3de330542b1e599ba21a9f9df9a9161a5b2edf\n4ac090e1d0c5faf69495d34930d6f55cfc52cfbeaf8dabf0cf744e55fa93b05c\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00116", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByWRYg6KxKOpPLS0zCb3+j+6vG+HTq/Mja/GQLjXY1uGmT9cEnEWjxJJKSHndqDJZqbLShruVJp2yFccr0\n db_pass: AgCxtQUXVRQGg3LRkupKj1Brgj9WX+Id6dmivLgZhg2GoqTMV7iR0iyY/KH62dek\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00117", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA3B17D55FAE28AF38\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-134e28b490f8-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00118", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00119", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00120", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00121", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00122", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n2a632f71b77f10f9eebe9bb15145f594a21382c7a28a021ef6ca340ad81f15c6\nb33e4101344413a8d0d5e2277f20479a9b87269a415dbc96276360011d70f520\n1ec7c042beb3b2c1436f1fb9a44e90198b5115873031ae806262d58b469314a7\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00123", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00124", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00125", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00126", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByOe+2HOrdU0XMktoMny9sIz/DhHAHVTPsCsA+Vxi5SpOgHZHuF2hnvO3wQMObDYd5P1Ox9bbFg7gE9Lgl\n db_pass: AgCxOwCidxY6k2gEOwu7z6WVntGijldeA5zDykd1RUGANCokcK/+VvU/mlxaUc5y\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00127", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00128", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00129", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n4534e1e00e286600c2f15bd597ce6563fa3e27041ae7284e95836e2b076eaa8f\nec8113a2e233e2370480aa4898641e21b5a293972e46b9b0760fdaaf41bc47d2\na7e536d2fdf4acfc08e51906cb2269c1752927c96422e9e3485df675724e58df\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00130", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA6093F48BC73D1D9D\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-66a0f75500c7-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00131", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00132", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00133", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIABA07020E7121C4D7\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-99aafb9d52db-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00134", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00135", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIABCFBD824A2E1FD91\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-e61898c98003-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00136", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00137", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00138", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByjrt1lxqyoiTTl5guwjdgNLXl7CxfQvSXeazXsLugmB0aVvD2PzV6E+ff6iajVhTI+vxdAnLQG/Y+DVA3\n db_pass: AgCxwNWe9y0LzViy+KKZR2pQVmR+sgABhDWTrlglt9gTLE+fUZK6qnDgQLxpJaVp\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00139", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBygtn9fnPU/T/eCeROe/oZWqOS33n7O8ktFAKjRc7i8LUvJc77whJKRgKP+Bl8Mm6uUvm69hoDsyBBaroR\n db_pass: AgCxEQSpEiSEAW29ZlDHXtaRNC/B/2rJkmN+P4J4CV7yq9aXh0Ow4CvZq1Bso25r\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00140", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA97D747DA912EC966\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-b355883f2968-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00141", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n35ba919e735eba25af3b368171c53a95f9ec6998a983c9bb85a19bc43491214b\nf06d2e8f700c2a7bfc3476dd07fe995a00b5de947df4c1b4b1022025c302b0c1\n7ed7905527394f77c5e4263d3ea84b61e343021060acabc05b3fe177ef3baeb0\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00142", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByhUj+OIfybBmkoHy/QhfZbZ7j36J4/R6Xi1YC4pwtQ5MRw6ClzLKztbkGqNdeONqacPPNxEHypvKO81b2\n db_pass: AgCxEo6ly/08sQ2SKzNTpJJUVba7+S57RRtt2FjCdgUS2D+RkUCvNiXVO8HKb/lS\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00143", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00144", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00145", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAA2C02C925D55F230\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-0c6ea3bc2166-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00146", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00147", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00148", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00149", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBysk2nx4wlNxzwkLk7uMLUttWF6WBmCJT0wAsGI6/BL5uFUuJ38dDUL73exPui/vGa3ByNNcUdXSAa8yGY\n db_pass: AgCx1GcsAWv2OkOkvhX0Jl0Uq0+4iFp9g3Gq2OugR8rWJp/u5/oGQKOMNWBw87PM\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00150", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00151", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00152", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00153", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByPuiaSefQWDXhsMpBbIT7dQs/uWOgP59d2xFXn6/wVkbtbGsfGI7ArcDCucxh/hdnxCDa1CY/Qb2z6Brn\n db_pass: AgCxxg0q3n2uXx1IkDdANiiMQ0yR5MBbHlBbko0QbN3xLXLvXnqqmwOBnw3SrSpI\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00154", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy4H3hHOQ2RhoYN47ngprOCQ4WjGXApGWNcGeRlV18ldss0puMG4JAqwhWZ+QvNbT3lsiWFTIX1/2YpFrq\n db_pass: AgCxo4dvQKvZfopwhAkkf42N7FAxslf8adkG80rDXysOv0y1iWpUc2gr7y6+4Lbi\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00155", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00156", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n8995ab4924dac44dfa75340461446c78cb22ec8c45083031e41f1cb974337e2c\n715d21fff0383c272fde041737f0629e8aef3f2f8e3a5a8c263f84fceb858b9f\na8ec9487e84c043ebe53439719200e9f22cdfd00aaf7132a08c7f473907e1e59\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00157", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00158", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00159", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00160", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00161", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nd98d2cf492069d5d81e97916d01804fc761d36571f0668749e7a8d7acb8c516d\ne19126f72d1980dfb06300ca8ea2f95dc5db46c615ef063fee2e7f46db26b67a\n945cfc4cb5c4f598631dfe0a4c87f16165e95e1bba4205a4d7f08d0c38befaf6\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00162", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00163", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\na7c79c72beaa0c462764fe80be8a6cec3c18867ae951f93e247aa9253e002cf5\n965c8775d0b63a146c1f29f4a37809b2bc890f7decf7914d987b7f1692524e10\n69a740b082ab6b1018537000022b26ddf01b1f1e8163490679ed0f441cc6d8b5\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00164", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00165", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nceee86621d0cd44d65fbe2bdaced48575d5f224c6353aa47fdf226b9a0187dc7\n4e2b8730ee93be6dc6902c96ad9ea4b16d9dffadbe57f3da13289a2e73eccc65\nc84749cfb540e00ad36ce95e88f3f4fb36822c9b65759aaffd903c76c157f141\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00166", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00167", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00168", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00169", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00170", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00171", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA134818EE59139E55\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-7bcc1c1a9d0a-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00172", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n4027206647630a2dedc63a13b739de711df6e23cacbe43bdbd17b2895408a489\n75cf7da59e892e454bf201a91cd7543bab796ef62c353ed0aeabf9d2a63d7b1d\n25b7031d157a53249255948e7715a95b89eec4ec26b79c3cd6c0928aab82b713\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00173", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByYdL3Vw0yLRP/I9VHKrfsKnXfuWTu9kViHzSYTWAkRVJ3jQBwfSdCZZGCPssur7maPY0W9VEsPsA10wgn\n db_pass: AgCxzmlx28pBcDwS0zd/l6vD/BcyPwGxjfdGAw2ny+F3PqlrR1mBs2uYya4JRaGg\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00174", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA889B9A79893D1979\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-15181b7b108b-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00175", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00176", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00177", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00178", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00179", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00180", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n912838ef66c1f33dc74332fba62c537a1de5c6c1312158321bf4353407f6a854\nb65b81dd7982cee8ff40c0c53c60b6b9eb374773153cdec3d16cd2bf97d5cfce\ndade3f7a741dea49ebc8f00ae0b5c2b1e3b2f0106465d8488ba78f58b7b5b71d\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00181", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00182", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy6Mse3dyT8ZOKwb39UVniFHzHB++Ktbo88vP/46qgWcCA2/ov1sxBp/WAS/IY8RkTEtuHBCeSKAyhO2vO\n db_pass: AgCxzero2wmQGm4J1KL3p7l/dHv7t+blgRczq4ZUnn0je4CZKE0keE4M70Usj8Ng\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00183", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00184", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByi5IiT55X/UFKpord37L0NAPOfzkfwdB7ISXB17nGSCg4DlKKmS3YFUEQWFaiPKBkrvC/smSaMFOc/9B8\n db_pass: AgCx1tMQ2AP0tPFrTSaUjy2zEPnx+VFx2uT54nLq9sbGojwDbekzWSxWK1u9PCgX\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00185", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00186", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00187", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00188", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00189", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00190", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n7638cf0f025cba61799d99acc3cc3337688c8c28f3d68e62257d9b97f3a29868\ne903349d9587f2a68e77b7cdfa391ff0a7e8ce303706f21b3487358499dc1246\nff27d95cca8078a43ab8d09ce6ee9cfae505d94cb59534c3649107e9722b4eb1\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00191", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00192", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA3020750DDCF9CBB3\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-805438aa16e1-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00193", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00194", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByvabNXNfwH77oLQ33qwBllgVINrfNXKP6zMndJuLLcaVRBxe10n5Pei2sTGhDmbyYoHeuI4ZLW4zG9pXl\n db_pass: AgCxsxewu3JmggPdSIVHAq7e+ra3I8B/DNlF2d8qDHczjbYU1zaPtO3x2i4XXovA\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00195", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00196", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00197", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00198", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00199", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00200", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00201", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00202", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00203", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00204", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00205", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByBF5nZK9L7trD41cm3fYXU7ZbhiBYF6XtqPkg0LiPWiFmOJY8Ya5Igq+pIXatnm4Gqjxu96zWcQvJcT6K\n db_pass: AgCxw4WIu13dfuoISZvIJdEN6ZNUgsHHZwWOYhsBfMMqDc3Ax16zIx2uvXOzFZBx\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00206", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00207", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00208", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00209", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA4EC3C16264D91A16\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-286b805315a1-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00210", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA511707434F9322CE\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-b769f62285ff-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00211", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\na1acba4844d3796b5579d68342189459f21e864416ca0da4e45f7fd0d616a6ff\n5736f4b14a80015aa45454da5c8d60d26bd8838e688dbfa090ecb64000a4b190\n18302a6b2f237d9543e609433d2ca590ccdf9ecd1a596206008b24054b1d4c9d\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00212", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA66BFF254D602C923\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-457e3a595e92-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00213", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00214", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByrFlrCwxgGXG4Q/mmFBXdfakOpP79FYPRqesG0vRWWDKHON4+Jij3nNmvpWleem/YA28BIKKT++qgwXAg\n db_pass: AgCxIQeZ0k4Tnvxl3AGijwqqik0OA/isu6gPrhNF3FGc1fhwMnBtmlRmwrNcmyVT\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00215", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00216", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00217", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00218", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByfDlTgsvD/JEOky44vs/LaNNBMfUaSB8/KMnHgKP4Os+6Dyl9fSajfvF6Hzn7Cvm4cG0MABB4I01rey6d\n db_pass: AgCxQz3WtN1nNzxYVfvCecndQjvAJO/WJNM/3tqkgKXkgw37BBPWW5gcrP3UUNhh\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00219", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nb4505aba742963612c42bbbb259b044814a2aebdc6ac2cf6d01a12cc6eec8972\n9d9063d1d517a372de39064a7757c312a5303d56e674e3e1116348c42a35e0e9\nfaa493565db6166e31e52c22534abd9c9b96f78f32a7f60613bca504f80fe062\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00220", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00221", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAA94DA2FA3EE2EB2D\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-f45466ac96a6-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00222", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00223", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00224", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00225", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA0CB3298CBFCD0A6D\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-191d4181b5ff-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00226", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00227", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA895B6D82289B1CC9\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-61e993bf79e8-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00228", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00229", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00230", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00231", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA0BC4B7DBC1223DAE\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-dafadbdb2af0-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00232", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00233", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00234", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA03583995113C97BE\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-3d7287ffd308-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00235", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n296dd614485406d61af849a9b22913c83a9fe98c1f76e0507f95d4d21d28a0b4\nf4ec6a9ffc40bcf1ea3317fb7a13626b9155e881658f14cb68c13a9c102915ce\na511511f162c5ea96291401236c6d621828a8d8a7119d84a70f0db430a0f2111\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00236", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nd2add434467a4c939d00178b3404911a376676e6b846c8ecfe8248d11662c445\n7d4c2cc63f2b96ff9ef7bd1910c6de37185835fbeac40d57dcd5f6e4a5675cff\nd2e08abac356acce2b5565bef35dc840816cb8fcd3f29a752db0b39939407d68\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00237", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00238", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00239", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n0550d77ad9992eb94391991cc64c329f1b67fe7b59babecb95489e81a12527d0\n08f55524d1bcbb8ae7fbd1e1980ed1e03ddcd3fb8c1e0648a357c3a730a04c4a\n4ef21bfd949817b3c7e91d9afad8ce471091c3d6f5b20fa085cdf50cc416dca0\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00240", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00241", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy5FBZ5lkCIl6nSuDhoEzV9QlQn5r+mXoD76AE77yInlhWGjPJGJcFw37BwvVJztfSliKqIiPQ8fwlH+ng\n db_pass: AgCxJEzqOrJEFt8XLQe+beI2/9lFKAdAIYQCTs68vSQ1E9zjenXvIzuhoise2TiN\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00242", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByNI1BGugOBAdYFZVKNDg5Sx3ltVqy5vS7MTJ99muypa0k4TfPGdfrHcWICR0vCFsPjl4eiQ/J0pyZ/NpL\n db_pass: AgCxPHyHWnKY5GWBE5mdj6zNrK+UMy7btH+0j2sUv57LF/rt6+fURYRc8DLR0Lff\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00243", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00244", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00245", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00246", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00247", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00248", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00249", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00250", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00251", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00252", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA645DBA230CD77100\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-2f674d842748-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00253", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00254", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nf3cdf2f8a5476e3b8816bc99823eae2f58939b0842c506e7dbbbd2d4b5bf5971\nd5cfcd3a22c5b63ff85310935a876ab702a962b2872df8766bca97695b0ba96a\n4bf36350111e800082203b0995f090617d01784759bce3065b8a87607e10d524\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00255", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00256", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00257", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00258", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA27D0BA2EEAF94CB6\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-4866aab6d128-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00259", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00260", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00261", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00262", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00263", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00264", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIACF474B0782F2DFAB\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-36c2bd335147-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00265", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00266", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00267", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByIA0fSdbwf/HyPrMpn99GKsi+Py6o9+wwHPGxXDgSh7oUimdVrqIObQOfGT5tg8lo8V/De399p1Fcdxzw\n db_pass: AgCxY0FlKfcjyPEu27MTVBbhB0a+y3g03lK3T/uBoJpLu/Sm9L+iOALHzQuzBqur\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00268", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00269", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\na20cce92c830c50b876f3b9bd853fe319c2b27fe8309ac2f1867e7a1300ed675\nc4798a0c00d30dab480e1bedc91a8b12cf4376468ee48e5b8d365c4eea947f12\nacdc382b517ac6e26a96dddbfdaa8ab67e486d7a5e763ac8070d83bc3e94cbeb\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00270", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00271", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByJzvdp05x1aVxfD4nenOGCJkOHakTRkQwX3FNnGIFRCUU1RYaiRPwsXsf0t2aI4IzhTWkNO1yqB1+2+qA\n db_pass: AgCxjSSzDrGyJFfTjg3zCe3eDDaYTKMTcZ63JQblp/Lzumtg7fpf+5qfA8xuZlpn\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00272", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00273", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00274", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00275", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00276", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nb1a60338b850e45e5a196340666cc781d4454d86c1d3e9a35cd4f632ba61e270\n4a12cfcf38cbb892009fd3afadc293d67c1be24918bc002388ef9417171b67c1\n2fd3fb9333e36b87245d04ee04477c62a81a462e66908d4dfea73f2ef4d3f838\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00277", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00278", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00279", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00280", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n15287d450441634074b65c39a4dac4599508b75c7bcba062c0bf24a7f4d8744f\n65edaa0c8bd802bad982f9221ac42aa7102d99f050ce29e257f98859cae2c3d4\n8d7a0787c065408fc59f05f12a8ef0997b9e175906d877b9ccc2964b4329a7e6\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00281", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByet8Ql00S5R7M5ZfLC3Fc/MfPVdxo05Nh7lr9Wfu97PBp7+PQIdhvj5h2SWNvqThjTuLhnzythonCq/VS\n db_pass: AgCxKdhg5pkrrkwq60uQMQhLGQ2eChspL5cPnxTIMb/Ndc4caLzIMSm+5fE9kZsW\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00282", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAB70990F480701950\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-c52d85b44bb3-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00283", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA15D6B5EF478CC68B\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-0acbdfba217a-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00284", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA0A8763B5E81BDA27\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-6ed8784266bf-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00285", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00286", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\ndfc576724d8c7ac164d9f1db0ef5e4d6ae2158d7cc39ee0e6652440d1f5976ec\n1f4cc7330c68d9f7c62d93261ff2651e2f15cfdee1ff83adae05e34fb74c1efc\n3116b3d2dbe5ac4ed3425dd94f716a30f26fb8712fdde57fd12c5283e30a7b94\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00287", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00288", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00289", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy5V7WywA1ghio+SErO9vw3N8na7l+i9CzyonUV2S6ZNCV6eu9NC21+7LUAEOiOTYUf613pcc3bRqc0l7t\n db_pass: AgCxvyAZTfm1wEOiXXoKlMkYlrI3bXA0TwEztK99JgBWkPsRqqT+38zUqZI8JjnT\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00290", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nac4ca445accb45b2a7994601394e2646f2b54bfeebcd7d067aa09a839b482b5f\n319cc93e8ad8beb0388f5561116786f61eb627b4ddf4d6d5bd9730463854c1a2\nefca88320590993fba2b2f4176c7dead388664a00fa75d965d50115e023a3b69\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00291", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBydEvBsnfGleU6v9Sl4wuogZ7V6XJu0uj0MZa90Udk/GYK9LY0OJTAyLabOvX4lw9Ucln/gq8g17oCDk6T\n db_pass: AgCx5c+4OwlNZa8K/MCUGf7GL8Xbwq4sWHOtXFgaGWYD0W2eSzLkL7mOLOzHRtEz\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00292", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA3CBE4C94EAC2F82E\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-f7d4637ebc75-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00293", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00294", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAA146AB16895E4E18\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-485a4b21112e-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00295", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIABC9C4012CAC7B157\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-6fd42c0b25b2-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00296", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByVGbFLDPxrmSkrRRdlNguYszMi3ESKjYXSUHCb48p0tUwL83cl5bmG/y2G9Jr7jHAiy+Tr5g44ZDdsuw5\n db_pass: AgCxOk5bWbIZiRj9bRlEaOUJOBOmNj8hGgNn800X5TjkjtieXzdnHPfWLMIQ/kRm\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00297", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00298", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n6d69918183ee33ebba2c5547200489a9744ea9d334d503fdd20ef0adc3a736a7\n589771bb733f87ff28ebe4a594d6197b82a096409924276dbe707bd0155b7d75\n06bd4998fc716a8db0024cd3a0e8318c155af3a0d8d0c41e732b5bc4eafb1975\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00299", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByoSPi1HNjH4SKInKOAb81J66XI2L6WIEDyNIA3q0LhwcvQC+u4oV/VHiGloiPE+ZF6xhw8F9+5jehrsUy\n db_pass: AgCx3IACxLiChKSAwStzUOC5WNYoSIBOGgSWzkifFWybp0a6IeYbESI+h11kAEqL\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00300", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByRd6ldGNoRk+qsxQw9X68C6T1sZ0UD0Db7JCXViaXhEMIkCfJuU21nbF3FbeGe885nZ9YhBel5kTWVMmA\n db_pass: AgCxZX3sFlI4Gb53wSdqlKekWhs6zA6QGb+FMrNn/wnA4IZHtPTVFN/gsuNaUrNB\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00301", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAC5E4564AAEDB0E07\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-d8bf92de7bb0-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00302", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00303", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00304", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAECAE275EA9550A75\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-246f2977307e-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00305", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00306", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA862C9499D03B2F16\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-831ac40b9e96-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00307", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00308", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00309", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n81a9c8db02d351acefa39eb54f7ac45b7912e1f8d53ac4af1258b955d3797881\nb80619fe8447c1afc47ee768a55ba4cd4f32751fb55701adf26c91057c2056d6\nc4b66aa93275d38b3a432d8ea8eabfc6549ec0028103266188864be91f27760d\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00310", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\ne2012e1f57ff27f766122c381ac7a17e4684869757ce12315a472d4adf35468b\nb892f97d3a7628bfc6e55a02aa91e9923e930c64b0c944a915c12a387a1da042\n2ec048951e8852a56b6220b54c70f63b9bc690fd487b58ccbfa9ee1ea070430f\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00311", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00312", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00313", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy44xnk1tJj0Wkid3nHD5Ri82e5ABxXbHY+V5fuknF20h7rrnxcI0LZ0cLAbU74zsHxHtklDywvS14tjlF\n db_pass: AgCxbMjxT0tr2WlBd9wmY+MCSlb6ou4ColdLHTnjoeFOnUmtEDBdX9uIGDZ/tZY2\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00314", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00315", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00316", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByobpFGuHgrXSPOiK2mIANDbzgT8wZc7ZOhHYMygxHbFUCiDaflAnhWk3lyx4egN/AarvjzJi8e0tCLaip\n db_pass: AgCxFg8SYi8x1hlZZmtNWOuT9n+fi8VPr/n0YHy4DbeII2wRtsNgg+jsC9KFqgw2\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00317", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00318", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00319", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nb7d4e18aba46b345e3980720dcdb5f480277601f667573bd44e1c0742b0c8034\n3b1a827b54c7334d2488fdabe2edd30f2e4693871ee5eebb221aa2b0b02a4ff3\na8a85c3dc25b3369a3d8be997b5bdbe455b973d9d2388a1f634cc914184c7ca4\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00320", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00321", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00322", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nef6af612f7aa490531845293a5d1b2bed9f7097fda62983c416cd9b39529ca37\n35a20e1bbb874dc7fde3011194182c7f1b70139a4d5499d94e9aa117212e4412\n2add8aea01b5a31910a926d1d2a4a9cae6d1580670ecb5a9f5ad62a2d98c87fa\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00323", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00324", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nffb4f13909ac067324f313f8e7b7e6d875470c941698fcda60665e6f79329cc9\n0aed9360ceb6157affddbd878a7785e046124646636c6f8c39cce304c139f9de\n489b3be1357bcbbab5022d99e1304eebae0b74ae1322d6643dc818bb333367cf\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00325", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00326", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00327", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nb0769ee6eb88a0b94ece923b78bdb89a21cf8cbe73b2ede7f7309c40f3c42344\nc1754b032a30171d0ab79ce341adf455a3062d4ef7ccde91768b96b0295ba01f\n400b2ea36178d51eed8f4efd49504aba1b04cc7ded8d5232bd43a5ada13b02d5\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00328", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00329", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA5D0241CC708DD386\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-0113d3b91cb9-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00330", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nda74643f0d3eadb811af30d22f80bc419d43e31dddb6d568d022a03bcfa9b753\n2c458ae941214b9830771a60b8c31ec499315a397e375de812a40ea053d5885a\n28f4f87f7bbde5ae0dc4142881bfbe7ae799db3ad051f5a045bb34441e882674\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00331", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAAE3FA09308CC3114\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-759861638bf3-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00332", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00333", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00334", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA44CEFE08E8881637\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-1ea8c7cde165-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00335", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n24dd3ebc823d3322093e7b065525e2b30154805a138b77c49944f8faedbd2c6e\nbf1343b72c5cc648e1e5faf0742caf3d62aba10cec75755ea9f0633dc6d3c311\n600d95302c8e3306bf77a967526842d9cc9ca3e9e67ce59c56cb4b6d7189a267\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00336", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00337", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA696722BAAEF9C47B\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-0433fb6c7167-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00338", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00339", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n36ec3078f33cb918ca569187e166f973b10dca74c65f0494cc99d6fd1ddeb907\ne26f6aeb7d3635760c5008138c917eca0fa9f7a98ba185b64e80e82e24d6f61b\n56626fd43c3c2fa8091ce16487f47d9ffaae0d57096d652f79478d1687e1f017\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00340", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByEyQdkb6SBXnkpujMg/+PzOgV5kq00Kg4KzqkSgXuTJA28bM4AGNERFdUUTgS2ztZG88KscQ0bMUJJiYE\n db_pass: AgCxdtdggQqIN4yIHGIbMjZYEYv9IFeSSNnW9/KPdK5UYm8ab5q9mP5SUPNttY0X\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00341", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIADE0FD8682E338894\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-21e747d725b4-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00342", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00343", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00344", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00345", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy73lohLKj+ZS/DduTTcvy/hCFrz1Fvh/lmT627Z176JPLiGcjeo4bQYcPG+FNmAGmrhK0NR/IvIFUh5c8\n db_pass: AgCxEB+TICA4U+Vi1/7M57Ykhc0WnzhyzTRNWne/1MORHaknOulCzSw9cGuI4M28\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00346", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00347", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00348", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00349", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n3c78f94a8ecd626c0a90a2f8920c738ee50f336e7599581ceb9135e25c84af0c\n6721a1bce44a852461a1d101e79b3fa514f67d2432a44e118fffe3a46450203e\n86d67669c8a63f04b6d3eea08fd1418e0a2b3946834b62c88224369dbfaa7f32\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00350", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00351", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00352", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00353", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA34068AA659EE45EB\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-6586eeb143ca-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00354", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00355", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00356", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00357", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00358", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00359", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00360", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00361", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00362", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00363", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByrBtttrsSAyB3dzp4bkDzyS9wTenTWnsyYMoEEYtV5kGYe2QOX9gWGBgrTN1DMMs/1et2AJlDzfa6JE/j\n db_pass: AgCxY7GreykD8y6NOWYIAu7bqwibEAWDEh8yibVQmi/zXReZIvyimsoPeLbxZZoJ\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00364", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00365", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00366", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nd0d0dcbfbac0805249f85882fd016b6a0d9f2e199eed9dd71ce54cbfcb133f6a\nc4374042f7b456bd1558160f407760cf78a9dd4a37eb29bbfe31999d4dcc1456\n8e84c64438ae4d5e55bdc781ab99721e1a2c327f3e6a9c7fd78a696f78da7f49\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00367", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00368", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByX1hZu80srAjcgyYlNNAEXD/S1plZynFeAHtAGeicBJNkD/9LOUD9eN8nRLXRs4yyFgcBSz6J5dqxSGz3\n db_pass: AgCxvljiVdX7wR5PthrOfQa68ayUJ2l7b1BHEY9Z5JZNjfBgpqSG+zxMaVOgQw0g\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00369", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA662C2FD8DA230B09\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-6397348b6cf8-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00370", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nb4f7b434ca7566d923f3e90ef9c1c215cbf7670bab9d8e00586ed91f02f189c2\n318e56e218ebbf811a5efa229b4c4b6eed92209db4813f2c5942117460580a81\nff0715fb73f20ef7b6952772edb20469b8eeee17ea30bb61e7d024022038d0ce\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00371", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00372", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nbad3cedcc311e93733798d8e1ef02376eb0b7a762770e855dc91e5411ba48ac1\n94fa342bafce082d7fea4519acb6a60bad577738f1763348cb0eec2f8d7c49f1\n81feba14197ae596dd30b6df0748ff2546e790bfcd739c73893bf59ed5ef33ee\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00373", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00374", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n33495198ca7d72039718a2dbb66e539f803469454d06f9452390a81ad7138302\nbcfa5e2361b1d11dfcecf640658c5e84477531c47462f56e3f6de0d25db1aaf1\nd2810b1210e84fa6052f397bb7f8b3c6d4894dfd33030766e3f23a0128a14c12\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00375", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00376", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00377", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00378", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByQGIUstw0PCFOXpQm7Tfp93wqViR4tWzcNt6Xa86PyMxgggYx0td9/ZvaqKrr25V509xB4epb+WulbsOw\n db_pass: AgCxEkTrbjgilLolb7t3fMPDUEsQpCnTDugnVGDKG2xV3x7uupuONvugsAdpF4p/\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00379", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n860dae4b5cb9a937b905508d354405baf957de7be95d8e0184f25470e2e53396\n30e14490afa6634906de396d5573b05a3fc39ac12101af373bf8efbc8c8db8ee\nb666a4331593e1224b1e04f36994a849dd2581eca546d02321b2afd0135b5018\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00380", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy277fkYitAET0OSfGd4Pzrg7QE2/L8rxFVfFLexolwwonmq2IMNb1W7kl6eiDYyz4xL+EEtgUtsf+lYq5\n db_pass: AgCxOeTqQ4+EU2QmEBOHsL2O5Mej3SSi4ttPYaD3n5MHc2GT16IVFsCQr68ynQyE\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00381", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00382", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00383", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00384", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA10F5DBFA1E9F826F\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-860af3351a52-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00385", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00386", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n9c5016a0d1c327d3844f77454d5af7fc315fd758f596efc5a17c62c6e71fe2fd\n2fcc5f9b56ce1ac408b8c0a42cec6190a789591187fa881749a67657a867d816\n238e5a59c1df4baf6c818a1ac7d74f85b9665ab6503ffc4263aa9513ead706f5\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00387", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00388", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00389", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nef287e9f08eb6d49deb6ef2c9f572db852772f67fea59307a74fdefc806d98de\n0fb792bcee6ff79c04e22be8237ec08e7d52baf41e29c1ef7dd02bda47c81ddf\n0c3e1dcaeeb40d8eaa9c658978ac67823c6f25447efbc46d8e40f61251601c4d\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00390", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00391", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00392", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00393", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00394", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00395", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByzVb8zPUAlyrlbdmYecLrnLV/awBHyjKzh7lr/DYZRe3Kc6tybC7UEKeBEsjOq8gbPX39Q0M0adHoKlhV\n db_pass: AgCxUjFA5QKiiSZWA4db25Txkhor1TSBAzMfG1i6yp7FONErD5DAyBy7Z9ToSg6W\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00396", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\ne3421f45bd4fb241093f00d19861495a83637c078c1870e5aff4f1ef0b94f2da\n8903c2cd5e59e5ce1b165c608170203b3314fb972161df11dde672177258c403\n59671a23dcfe23b6b29fecf134d061f6125f484733e0413a53bfe4d58a7552f4\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00397", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA88FEC13F589E0C0B\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-0d9fa5f3671e-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00398", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00399", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00400", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00401", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA39571113B9C39927\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-2dce88ce59c0-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00402", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00403", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00404", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBysD6yInvH7NLj3si4XzHnLLo17NbS3mTohis7VREwqxTTamhO7A5yLE047hOMAu6H/iFKUM8hVq1otREL\n db_pass: AgCxhGstUhqXalmRYhPw2iQqqU8+OGbxNflI7Khg0/5WOtCxBUov2nXbDTmDhSxy\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00405", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00406", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00407", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00408", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00409", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAFF8CFEA7FA1CFA62\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-420592d51ef9-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00410", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00411", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00412", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00413", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00414", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00415", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByEcxLJwZ61i1uUG5713KlGSRzpPRRD2Bnnaef+V9w1YmMx1zAewB2EYVnsFpbAp2BTiODhD7q9v9eOAIl\n db_pass: AgCxGOyhkrAa4fW38JZC1xELrVKqa9bEB8/d9E/ORosAg2vv1qbiCZUdxeobGPow\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00416", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00417", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00418", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00419", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00420", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00421", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00422", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00423", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00424", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA4C0D90C71B3DC67A\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-80c6eb060182-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00425", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n0b14470389c337bd65a24b1e1ed1682d5b5a78dbf6850eff4c8d7fde97a692a9\n44caf437b47d49bb2c0d7ecade0fe801136918ceb8bc70140a4b45ecd262fe1a\n5f195ac6e8e151c2e0088baea4c477285fcfa1c95810e37dfd9fb3f7102db37a\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00426", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA3F5B5144A7E6D29C\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-de8f1f2cb06c-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00427", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00428", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00429", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00430", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00431", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy/cjoCDL/Ep14Ly57YlOnWFiJxhjz1+5BMRyOSEqH3PqzuRs0OO9zGK7+M3+ee0VmcriEun9IwqwatkbX\n db_pass: AgCxRWP/g7fUTWXsgddoLq1CZhVcZRb3Wb1XA7WUQgFGGaZr8Ep9JS3jyMX67oN4\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00432", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00433", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00434", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00435", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00436", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00437", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00438", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00439", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00440", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n9bb567d217bf56787a63bb7efc4a5413a8bb38100afeefa615fa9a08fe76e0e6\n016ae15816832b636615a888dfd4b6154cabefefa21d22cc9c370a032e87cbf3\nb76bba418d502c9407441ffe8e452ed5f9428fe4ecb2e86133a06ca31ab7fbd6\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00441", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00442", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00443", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00444", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAB5AB2D18093B8933\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-0a18a1a8f6e2-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00445", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00446", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00447", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00448", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00449", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n3ceaf828e5b0f8c7f987892442359ba680bc2c02075fceea881788d36a91e6c6\nab1034def569e3ce34a0a17fe6cf4a684989e51761df23aee665552ccf0a46c4\n8f8bab114756f636b008affa06fbc747f340b7550ba33fcdfbf72ab9638834c6\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00450", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00451", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00452", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00453", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00454", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00455", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00456", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00457", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIAE317F8BE7886F540\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-b16d22341819-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00458", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByUg60Sifw5VgmhrkIWDSrYqoCgZZzIm/EoDvh1+CC8VMm4PMbepBGRUvrZkopRCQ8rg1v9IAnrjxW6cp4\n db_pass: AgCxDuvq/s1sea8RKLHvAaRzAQyCnLVFI7yT3T5LMTKV78O0F5K/8SH4gWziaVfv\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00459", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00460", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00461", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nc7de6ebd2ab046bdd4dddce94402fb3c37ffdd4aa01e7ea98ddcc6c53a5a5f22\n71dcaa06224a3af1cb38e080a4f93f55792fc0b8ac4ab106185c0134ce41df12\n21adb90033bbc19a2b5e81f75214e961b1d932157afcdda14a351aab1d798160\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00462", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00463", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00464", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00465", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00466", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nc31670a1effae82045fa008ab3c2b9375ab0f55b7be6f1f7ce4403592c3b4a70\na08d8fdd9fdbf2b850061dc84a1cb25889005a9271ef5b4cad2168534f38d0a6\n7831f2c052a658f40855959743950f4baadbbbcc0554928117bde9ee282a587d\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00467", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00468", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy8640Ao2NuPb93+IRTeBI1G6aUv1Wwkh6L4ypgf+y11y5BodR00mL3fzsD5x+vzsf7+6/v9jGU1yjW3qg\n db_pass: AgCxzZ46xRW5zanyvzCfB0Dyo4l5P7osB6GuwlH/MsCsFnSA8h988EXcnVvn71Xg\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00469", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00470", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n9eaaa6844c708fde4c0de3248627ef276b567f0ec072acea6b6f765cf714e21b\nb23d94eb2b9168e64819e5a8183a0f3316675dad0c1886662f89691d08e7568a\n04cc166af1c6583e1cce48080d74d9b78fcd2c37d89293acda5eee95be301b56\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00471", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nbc78d5a6601813793173ef85839a7ba01ad33f69352d4357c2e5421a6629cca7\n246c5cea06900ca68643ef935a71b1dea630a1cada320e7643f86f30b42689bb\n44f5f116bb911436883fbf6ef6b8900773877dd4858d574ecc4858fa204d0ca7\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00472", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\nb93e8dde0b5b39ab856cfcfdb20896f4d8ae43cc8fe5e64caeb70ccfac85ab4c\n952418849183c087c6946841574aeacfcb0632ed6e0f5caf86d58673d0ed1a25\n6549fd44b859632bfced9023156f3b84b3ec24bcefbb129e9bff814e7713b930\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00473", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00474", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00475", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByGzXfVekoTX8RciP0Q4oQ5IKsOxt27Gu7s2tWO7lF7QBuWAJe+/nLitf3YVmnZ9Q1HMtsKd9bsYoNg9fE\n db_pass: AgCxQB7TT0k8fkYuRGbhdks/x5eQijzqoAjNj/cAwxAPOYdm+Ced5+6+4E+oGHU+\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00476", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByJSD+EX1S9w7PNSTE0fJZ6GfJYH5iMDrGDKEwz1lg81qFYYWcP5HZcd5647/47t2LdYDsnYGCPipU5E/+\n db_pass: AgCxzbxAT6kNzL5ydg/s3qGFojLziGfbhzHvxeV7lBF4sHHS5tR5MFhnKYjWJkWN\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00477", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByufnHd7ssZvtumshm/NZc2UtNhRaEg0DKFwnyarXu/vMi3onn52S3mjtKE8kk6uePOpM7cLX/TGpt7iFb\n db_pass: AgCx7wGYMbBqe/FJzFZBoFMqev6OPh6stFsbcVSYvraWpvO/DaybxdXgZ+NxCJgE\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00478", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n09877a1a1b4fb633a883ddf07dd86ccabeb71a872c3a5edd6a6d4b30b9e2660a\n79861abb0dbb26b806cdbdc011e26a8b72fa586f820b2560a812ee78feae1214\n3cad52d00c42dbb0e19b18851f1ef5a422d01fe7c5f27099309193ef90544b8f\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00479", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByuAcwo+Ip7ekvoAl7E+VwWR8QtvZWKeEmUmP7rcOOx8GeIwEEb1xB56/DdZy8sXcbnTwJH2eN9IaD32yh\n db_pass: AgCx4MdHpTudC9gttWqAMzlXMwLSg0I7m63P8uvlV2kD/DmIM0A6zdnh0/YOGe8E\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00480", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByQH2k2ddX8jut0dP28Ob/rTQa43AK750VU3HWDDJbQqhb/0AR8F/mFOWc2vo1WhLv2HBCqxXcnpC6XsrF\n db_pass: AgCx26wnEuV6aqG5jI0fcTYguj7lE7XRKTFRgWBM/jbb2DB8GZPLLj4nOga7OfFm\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00481", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA57E0BB6B768888C3\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-7601b1f50789-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00482", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00483", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgBy9k1A8Y9rQtrlHv+uMfGCF1yRuL11GIWmdDUJRvsCgizMlMPiKCfNRtIERcobN7ixfhuFIiyi3haHA14w\n db_pass: AgCxAIclT7fd0r8mtA+kfkMUCOtuE3VQhp7e+fLy6Z34kZkCFlXF9XPnx0TmAWL0\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00484", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n973747247f95d4c642764e28711f9d44a893d4002afffb4ff203f600c2299a67\n5299317f90841cc4264ec180347b6c98431c670a2802664569ff9c7fd0f15093\n711ff0db3f8928d2123ab187ec07322ea3fa6fa36f942d22e4783343a0ea32a5\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00485", "source": "hard_negatives", "source_license": "generated", "text": "apiVersion: v1\nkind: ConfigMap\ndata:\n DB_HOST: postgres-service\n DB_PASSWORD: \"\"\n CACHE: \"true\"\n# DB_PASSWORD empty \u2014 injected via K8s secrets at runtime.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00486", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByP77Htr60oNZZSUGfVT7s6QrZkBoZFkGGjWoFqJ00MNACxf8vXMsUj/5DojJko+qnFw/CO0oIf+m5g6yn\n db_pass: AgCxj6q8SNCwCwg3fNfI6YoxkOZvhvJhXTpqeomQbQPif8o0/2OXcZIO3JVAoWbN\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00487", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00488", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n88ceb87f81295c1f2e4a830927396486da0edbcddc33b6d9da64a111b4ba465d\n365e729004026bd8d4e393f93edf38a912b4e48d2b101a97bd9fb22ba0fc060b\n789a4a207d7ad6d109439dea2e6b374dc2a0fc3df7f0aede81ecffbe36c11b7b\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00489", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00490", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIABE32DA7886970DC9\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-809d82f3fadd-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00491", "source": "hard_negatives", "source_license": "generated", "text": "[server]\nhost = 10.0.1.50\nport = 5432\nuser = readonly\npassword =\nsslmode = verify-full\nsslcert = /etc/certs/client.crt\n# Password empty \u2014 using mTLS certificate auth.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00492", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00493", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00494", "source": "hard_negatives", "source_license": "generated", "text": "# Honeypot Configuration\nhoneypot:\n enabled: true\n canary_tokens:\n - name: fake-aws-key\n value: \"AKIA4DA34C24044C3066\"\n alert_on_use: true\n - name: fake-db-pass\n value: \"canary-576b6a2f7320-not-real\"\n alert_on_use: true\n# These are INTENTIONALLY FAKE for intrusion detection.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00495", "source": "hard_negatives", "source_license": "generated", "text": "$ANSIBLE_VAULT;1.2;AES256;vault-id\n39deeb9319468c2dab7b5a1d6fb627caef5b76c9e5aa082d749cf854564caf01\n763edfb8324e04b3e2aafcd2c78ec0b0030c7dba2153380955e62116184b06e6\nb6acfafb561f5ded74c14537fc70095e0a35733d1354a3f3060762ca0336d01d\n# Ansible Vault encrypted \u2014 decrypt with vault password.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00496", "source": "hard_negatives", "source_license": "generated", "text": "# Sealed Secret \u2014 encrypted for cluster\napiVersion: bitnami.com/v1alpha1\nkind: SealedSecret\nspec:\n encryptedData:\n api_key: AgByBCMryBcvWVLr++rTePfNlJNJjPiu6CtXNqwO2H8cyooaPTy+6Kh73pmuYIrolWqrxGzLr6Y4OAh+NxDP\n db_pass: AgCxbF0qgP4+bbUI+iCdbSHkj6LSeE/FM0cYbRb1RVN6WAYCPSAbzzjBiALe2eY3\n# Sealed secrets are encrypted \u2014 safe in git.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00497", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example\nDATABASE_URL=postgresql://user:password@localhost:5432/myapp\nSECRET_KEY=<generate-a-random-secret>\nAPI_KEY=<your-api-key>\nAWS_ACCESS_KEY_ID=<your-key>\n\n# ALL values are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00498", "source": "hard_negatives", "source_license": "generated", "text": "name: CI/CD\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n API_KEY: ${{ secrets.API_KEY }}\n DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n# Secret references only \u2014 no values.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}
{"id": "hard_safe_configs_00499", "source": "hard_negatives", "source_license": "generated", "text": "version: '3.8'\nservices:\n postgres:\n image: postgres:16\n environment:\n POSTGRES_PASSWORD: postgres # Default local dev\n redis:\n image: redis:7\n minio:\n image: minio/minio\n environment:\n MINIO_ROOT_USER: minioadmin # Default\n MINIO_ROOT_PASSWORD: minioadmin\n# Well-known defaults for local development ONLY.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration with placeholder, empty, encrypted, default-dev, or honeypot values. No real secrets exposed."}]}