diff --git "a/synthetic/hard_safe_config_files.jsonl" "b/synthetic/hard_safe_config_files.jsonl" new file mode 100644--- /dev/null +++ "b/synthetic/hard_safe_config_files.jsonl" @@ -0,0 +1,500 @@ +{"id": "hard_safe_config_files_00000", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00001", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00002", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00003", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00004", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00005", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00006", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00007", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00008", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00009", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00010", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00011", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Yuki Lopez \u2014 SSRF via webhook\n- Robert Williams \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00012", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Carlos Garcia \u2014 XSS in admin panel\n- Thomas Smith \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00013", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00014", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Wei Hill \u2014 IDOR in API\n- Maria Davis \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00015", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Thomas Walker \u2014 XSS in admin panel\n- Sarah Young \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00016", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00017", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00018", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00019", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00020", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00021", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00022", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00023", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00024", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00025", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00026", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00027", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00028", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00029", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00030", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Carlos Young \u2014 SSRF via webhook\n- Jennifer Patel \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00031", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00032", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00033", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00034", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00035", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00036", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00037", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00038", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00039", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00040", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00041", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Fatima Davis \u2014 XSS in admin panel\n- Thomas Jones \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00042", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Olga Lee \u2014 SSRF via webhook\n- David Nguyen \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00043", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00044", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Emily Rodriguez \u2014 XSS in admin panel\n- Carlos Lopez \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00045", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Ahmed Lee \u2014 XSS in admin panel\n- Thomas Rodriguez \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00046", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00047", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00048", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00049", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00050", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00051", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00052", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00053", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Ahmed Scott \u2014 XSS in admin panel\n- Michael Hill \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00054", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00055", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00056", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00057", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00058", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00059", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00060", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00061", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00062", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00063", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00064", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00065", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00066", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00067", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00068", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00069", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00070", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00071", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00072", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Patricia Davis \u2014 SSRF via webhook\n- Yuki Lopez \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00073", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00074", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- John Singh \u2014 SSRF via webhook\n- Michael Chen \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00075", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00076", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Priya Hall \u2014 SSRF via webhook\n- David Miller \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00077", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00078", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00079", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00080", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Ahmed Johnson \u2014 XSS in admin panel\n- William Scott \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00081", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00082", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00083", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00084", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00085", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00086", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00087", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00088", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00089", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00090", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00091", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00092", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00093", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00094", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00095", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Andrew Hill \u2014 XSS in admin panel\n- Sarah Davis \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00096", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00097", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00098", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00099", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00100", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00101", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00102", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00103", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00104", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00105", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00106", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00107", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00108", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00109", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00110", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Patricia Johnson \u2014 SSRF via webhook\n- Emily Miller \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00111", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00112", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00113", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00114", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00115", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00116", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00117", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00118", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00119", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00120", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00121", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00122", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00123", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- James Johnson \u2014 XSS in admin panel\n- Ahmed Rodriguez \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00124", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00125", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00126", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00127", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00128", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Fatima Walker \u2014 IDOR in API\n- Wei Nguyen \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00129", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Mary Johnson \u2014 SSRF via webhook\n- John Johnson \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00130", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00131", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00132", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00133", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00134", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00135", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00136", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Olga Singh \u2014 XSS in admin panel\n- Yuki Williams \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00137", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00138", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00139", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Yuki Ali \u2014 IDOR in API\n- William Nguyen \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00140", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00141", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00142", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00143", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00144", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Priya Singh \u2014 SSRF via webhook\n- Linda Brown \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00145", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00146", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00147", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00148", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00149", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00150", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00151", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Emily Ali \u2014 IDOR in API\n- Robert Wright \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00152", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00153", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Ivan Patel \u2014 IDOR in API\n- Yuki Wright \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00154", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00155", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00156", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00157", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00158", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00159", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- William Wright \u2014 SSRF via webhook\n- Carlos Rodriguez \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00160", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Elizabeth Chen \u2014 SSRF via webhook\n- William Martinez \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00161", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00162", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00163", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00164", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00165", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00166", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Jennifer Hall \u2014 XSS in admin panel\n- Carlos Ali \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00167", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00168", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00169", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00170", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00171", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00172", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00173", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00174", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00175", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00176", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00177", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00178", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00179", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00180", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Robert Brown \u2014 SSRF via webhook\n- Robert Jones \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00181", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00182", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Olga Lee \u2014 SSRF via webhook\n- Andrew Davis \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00183", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Thomas Williams \u2014 SSRF via webhook\n- James Rodriguez \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00184", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00185", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00186", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Patricia Jones \u2014 SSRF via webhook\n- Sarah Singh \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00187", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00188", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00189", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00190", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- William Johnson \u2014 IDOR in API\n- James Young \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00191", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00192", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00193", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00194", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00195", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00196", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00197", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00198", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00199", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00200", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00201", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00202", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00203", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Emily Kim \u2014 XSS in admin panel\n- John Miller \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00204", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00205", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00206", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00207", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00208", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00209", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Linda Garcia \u2014 XSS in admin panel\n- Mary Singh \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00210", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00211", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00212", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00213", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00214", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00215", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00216", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00217", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00218", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Emily Miller \u2014 IDOR in API\n- Mary Smith \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00219", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Thomas Patel \u2014 SSRF via webhook\n- Maria Patel \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00220", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00221", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00222", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00223", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00224", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00225", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00226", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00227", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00228", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00229", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00230", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00231", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00232", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00233", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00234", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00235", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00236", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00237", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00238", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00239", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00240", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00241", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00242", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00243", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00244", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00245", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00246", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00247", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- James Lee \u2014 IDOR in API\n- Carlos Chen \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00248", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00249", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00250", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00251", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00252", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00253", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00254", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Thomas Walker \u2014 IDOR in API\n- Patricia Lopez \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00255", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Michael Walker \u2014 SSRF via webhook\n- Thomas Wright \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00256", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00257", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00258", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00259", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00260", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Michael Rodriguez \u2014 IDOR in API\n- Raj Chen \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00261", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00262", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00263", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00264", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00265", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00266", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00267", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00268", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00269", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Priya Smith \u2014 XSS in admin panel\n- William Brown \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00270", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00271", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00272", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00273", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- David Davis \u2014 IDOR in API\n- Ivan Chen \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00274", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00275", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Priya Kim \u2014 XSS in admin panel\n- Jennifer Rodriguez \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00276", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Elizabeth Singh \u2014 IDOR in API\n- Maria Jones \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00277", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00278", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00279", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00280", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00281", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00282", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00283", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00284", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00285", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00286", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Mary Young \u2014 SSRF via webhook\n- Jennifer Chen \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00287", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00288", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00289", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00290", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00291", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00292", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00293", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00294", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00295", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00296", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00297", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Patricia Lopez \u2014 IDOR in API\n- Elizabeth Johnson \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00298", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Sophia Jones \u2014 XSS in admin panel\n- David Williams \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00299", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00300", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Jennifer Garcia \u2014 XSS in admin panel\n- Sarah Ali \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00301", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00302", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00303", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00304", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00305", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00306", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00307", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00308", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00309", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Linda Lee \u2014 IDOR in API\n- John Hill \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00310", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00311", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00312", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Sophia Wright \u2014 IDOR in API\n- Raj Singh \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00313", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00314", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00315", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00316", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00317", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00318", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00319", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Elizabeth Lopez \u2014 XSS in admin panel\n- Ivan Smith \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00320", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00321", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00322", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00323", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00324", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00325", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Priya Kim \u2014 SSRF via webhook\n- Elizabeth Lee \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00326", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00327", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Patricia Davis \u2014 XSS in admin panel\n- Maria Miller \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00328", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00329", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00330", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00331", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00332", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00333", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- James Nguyen \u2014 IDOR in API\n- David Nguyen \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00334", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00335", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Olga Rodriguez \u2014 IDOR in API\n- Emily Patel \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00336", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00337", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00338", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Yuki Young \u2014 XSS in admin panel\n- Fatima Miller \u2014 Auth bypass\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00339", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00340", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00341", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00342", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00343", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00344", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00345", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00346", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00347", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00348", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Robert Nguyen \u2014 XSS in admin panel\n- Sophia Hall \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00349", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00350", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- William Wright \u2014 XSS in admin panel\n- Carlos Wright \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00351", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00352", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00353", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00354", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00355", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00356", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00357", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00358", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00359", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00360", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00361", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00362", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00363", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00364", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Olga Walker \u2014 IDOR in API\n- Robert Kim \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00365", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00366", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00367", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00368", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00369", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00370", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00371", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00372", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00373", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00374", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00375", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00376", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00377", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00378", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00379", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00380", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00381", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Sophia Kim \u2014 XSS in admin panel\n- Jennifer Miller \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00382", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00383", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- John Singh \u2014 SSRF via webhook\n- Wei Jones \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00384", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00385", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00386", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00387", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00388", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00389", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00390", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00391", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00392", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00393", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00394", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00395", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00396", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00397", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00398", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00399", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00400", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00401", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00402", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00403", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00404", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00405", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00406", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00407", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00408", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00409", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00410", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00411", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00412", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00413", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00414", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00415", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00416", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00417", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00418", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- David Rodriguez \u2014 XSS in admin panel\n- Robert Young \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00419", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00420", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00421", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- William Hall \u2014 SSRF via webhook\n- Fatima Kim \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00422", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00423", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00424", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00425", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00426", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00427", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00428", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00429", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00430", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00431", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00432", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- William Rodriguez \u2014 IDOR in API\n- Michael Hill \u2014 Privilege escalation\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00433", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Yuki Young \u2014 XSS in admin panel\n- Ahmed Miller \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00434", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00435", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00436", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00437", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00438", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00439", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00440", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00441", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-1\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00442", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00443", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00444", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00445", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00446", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00447", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00448", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00449", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00450", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00451", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00452", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00453", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00454", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00455", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00456", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00457", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00458", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00459", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00460", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00461", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00462", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00463", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00464", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00465", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00466", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00467", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00468", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00469", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00470", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00471", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00472", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00473", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00474", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00475", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00476", "source": "hard_negatives", "source_license": "generated", "text": "# docker-compose.yml \u2014 LOCAL DEVELOPMENT ONLY\n# Default passwords are for local dev containers only\nversion: '3.8'\n\nservices:\n postgres:\n image: postgres:16-alpine\n environment:\n POSTGRES_DB: app_development\n POSTGRES_USER: devuser\n POSTGRES_PASSWORD: devpassword # Local dev only\n ports:\n - '5432:5432'\n volumes:\n - pgdata:/var/lib/postgresql/data\n\n redis:\n image: redis:7-alpine\n command: redis-server --requirepass localredis # Dev password\n ports:\n - '6379:6379'\n\n rabbitmq:\n image: rabbitmq:3-management\n environment:\n RABBITMQ_DEFAULT_USER: guest # Default dev\n RABBITMQ_DEFAULT_PASS: guest # Default dev\n ports:\n - '5672:5672'\n - '15672:15672'\n\nvolumes:\n pgdata:\n\n# WARNING: These are well-known defaults for LOCAL DEVELOPMENT.\n# Production uses Kubernetes secrets. See deploy/k8s/secrets.yaml", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00477", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00478", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-staging\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"production\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00479", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00480", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00481", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00482", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00483", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00484", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00485", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-2\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00486", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00487", "source": "hard_negatives", "source_license": "generated", "text": "# main.tf \u2014 Infrastructure as Code\n# All secrets come from variables (injected via CI/CD)\n\nvariable \"db_password\" {\n type = string\n sensitive = true\n}\n\nvariable \"api_key\" {\n type = string\n sensitive = true\n}\n\nresource \"aws_db_instance\" \"main\" {\n identifier = \"myapp-prod\"\n engine = \"postgres\"\n engine_version = \"16.1\"\n instance_class = \"db.t3.medium\"\n username = \"appuser\"\n password = var.db_password # From Terraform Cloud\n db_name = \"myapp\"\n\n tags = {\n Environment = \"staging\"\n }\n}\n\nresource \"aws_ssm_parameter\" \"api_key\" {\n name = \"/myapp/api_key\"\n type = \"SecureString\"\n value = var.api_key # Encrypted at rest\n}\n\n# No hardcoded secrets \u2014 all values from variables.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00488", "source": "hard_negatives", "source_license": "generated", "text": "# .gitignore \u2014 Protect sensitive files from being committed\n\n# Environment files with secrets\n.env\n.env.local\n.env.production\n.env.*.local\n\n# Credentials\ncredentials.json\nservice-account.json\n*.pem\n*.key\nid_rsa\nid_ed25519\n\n# Cloud provider\n.aws/credentials\n.gcloud/\ntfstate\n*.tfstate\n*.tfstate.backup\n.terraform/\n\n# IDE\n.vscode/settings.json\n.idea/\n*.swp\n\n# Build artifacts\ndist/\nbuild/\nnode_modules/\n__pycache__/\n*.pyc\n\n# Logs that might contain tokens\n*.log\nlogs/\n\n# Coverage\ncoverage/\n.nyc_output/", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00489", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00490", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00491", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00492", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00493", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 Copy to .env and fill in your values\n# DO NOT commit .env to version control\n\n# Application\nAPP_NAME=myapp\nAPP_ENV=development\nAPP_PORT=3000\nDEBUG=true\n\n# Database\nDB_HOST=localhost\nDB_PORT=5432\nDB_NAME=myapp_dev\nDB_USER=your_username_here\nDB_PASSWORD=your_password_here\n\n# API Keys\nSTRIPE_API_KEY=your_key_here\nSENDGRID_API_KEY=your_key_here\nAWS_ACCESS_KEY_ID=your_key_here\nAWS_SECRET_ACCESS_KEY=your_secret_here\n\n# Auth\nJWT_SECRET=generate_a_random_secret\nSESSION_SECRET=generate_a_random_secret\n\n# ALL values above are PLACEHOLDERS. Replace before running.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00494", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00495", "source": "hard_negatives", "source_license": "generated", "text": "# .github/workflows/deploy.yml\nname: Deploy to Production\n\non:\n push:\n branches: [main]\n\njobs:\n deploy:\n runs-on: ubuntu-latest\n environment: production\n steps:\n - uses: actions/checkout@v4\n\n - name: Configure AWS\n uses: aws-actions/configure-aws-credentials@v4\n with:\n aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}\n aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n aws-region: us-east-1\n\n - name: Deploy\n env:\n DB_PASSWORD: ${{ secrets.DB_PASSWORD }}\n API_KEY: ${{ secrets.API_KEY }}\n STRIPE_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n SENTRY_DSN: ${{ secrets.SENTRY_DSN }}\n run: |\n ./scripts/deploy.sh\n\n# All secrets are GitHub encrypted secrets \u2014 no values in this file.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00496", "source": "hard_negatives", "source_license": "generated", "text": "# SECURITY.md\n\n## Security Policy\n\n### Supported Versions\n| Version | Supported |\n|---------|-----------|\n| 3.x | Yes |\n| 2.x | Security fixes only |\n| < 2.0 | No |\n\n### Reporting a Vulnerability\nPlease report security vulnerabilities to security@example.com.\n\n**DO NOT** open a public GitHub issue for security vulnerabilities.\n\n### Response Timeline\n- Acknowledgement: within 48 hours\n- Triage: within 5 business days\n- Fix: depends on severity (Critical: 7 days, High: 30 days)\n\n### Scope\n- Authentication and authorization bypasses\n- Data exposure vulnerabilities\n- Remote code execution\n- Cross-site scripting (XSS)\n- SQL injection\n\n### Out of Scope\n- Rate limiting on public APIs\n- Missing security headers on non-sensitive pages\n- Social engineering attacks\n\n### Hall of Fame\nWe thank the following researchers:\n- Olga Chen \u2014 SSRF via webhook\n- Raj Jones \u2014 Open redirect\n\n*This is a security policy document, not a vulnerability report.*", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00497", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00498", "source": "hard_negatives", "source_license": "generated", "text": "# k8s/rbac.yaml \u2014 Role-Based Access Control\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n namespace: production\n name: app-reader\nrules:\n - apiGroups: [\"\"]\n resources: [\"pods\", \"services\"]\n verbs: [\"get\", \"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"secrets\"]\n verbs: [] # No access to secrets\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n name: app-reader-binding\n namespace: production\nsubjects:\n - kind: ServiceAccount\n name: app-sa\nroleRef:\n kind: Role\n name: app-reader\n apiGroup: rbac.authorization.k8s.io\n\n# Least-privilege RBAC \u2014 no secret access granted.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]} +{"id": "hard_safe_config_files_00499", "source": "hard_negatives", "source_license": "generated", "text": "# vault-config.hcl \u2014 HashiCorp Vault configuration\nstorage \"raft\" {\n path = \"/vault/data\"\n node_id = \"vault-3\"\n}\n\nlistener \"tcp\" {\n address = \"0.0.0.0:8200\"\n tls_cert_file = \"/vault/certs/server.crt\"\n tls_key_file = \"/vault/certs/server.key\"\n}\n\napi_addr = \"https://vault.internal:8200\"\ncluster_addr = \"https://vault.internal:8201\"\n\nseal \"awskms\" {\n region = \"us-east-1\"\n kms_key_id = \"alias/vault-unseal\" # KMS alias, not a secret\n}\n\ntelemetry {\n prometheus_retention_time = \"24h\"\n disable_hostname = true\n}\n\n# Vault config \u2014 no secrets stored here. Secrets managed inside Vault.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Configuration file with placeholder values, variable references, secret manager references, or development defaults. No real credentials exposed."}]}