{"id": "hard_safe_tutorial_credentials_00000", "source": "hard_negatives", "source_license": "generated", "text": "# Stripe Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://stripe.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport STRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nexport STRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = stripe.Client(api_key=\"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00001", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SLACK_BOT_TOKEN: xoxb-not-a-real-token-placeholder\n SLACK_SIGNING_SECRET: not-real\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00002", "source": "hard_negatives", "source_license": "generated", "text": "// OpenAI SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"org-xxxxxxxxxxxx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.OPENAI_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00003", "source": "hard_negatives", "source_license": "generated", "text": "// Anthropic SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"default\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.ANTHROPIC_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00004", "source": "hard_negatives", "source_license": "generated", "text": "# Firebase Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://firebase.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport FIREBASE_API_KEY=AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nexport FIREBASE_PROJECT_ID=my-project-12345\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = firebase.Client(api_key=\"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00005", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n STRIPE_SECRET_KEY: sk_test_4eC39HqLyjWDarjtT1zdp7dc\n STRIPE_PUBLISHABLE_KEY: pk_test_TYooMQauvdEDq54NiTphI7jx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00006", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: anthropic-creds\nstringData:\n anthropic_api_key: \"\"\n anthropic_model: \"\"\n# Example format: sk-ant-xxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00007", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n ANTHROPIC_API_KEY: sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n ANTHROPIC_MODEL: default\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00008", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"anthropic\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00009", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: mongodb-creds\nstringData:\n mongo_uri: \"\"\n mongo_db_name: \"\"\n# Example format: mongodb://user:passw...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00010", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_AWS_ACCESS_KEY_ID = \"AKIAIOSFODNN7EXAMPLE\"\nMOCK_AWS_SECRET_ACCESS_KEY = \"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.aws_key\", MOCK_AWS_ACCESS_KEY_ID):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00011", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n FIREBASE_API_KEY: ${{ secrets.FIREBASE_API_KEY }}\n FIREBASE_PROJECT_ID: ${{ secrets.FIREBASE_PROJECT_ID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00012", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n OPENAI_API_KEY: sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n OPENAI_ORG_ID: org-xxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00013", "source": "hard_negatives", "source_license": "generated", "text": "// Stripe SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\", // Replace with your key\n secret: \"pk_test_TYooMQauvdEDq54NiTphI7jx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.STRIPE_SECRET_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00014", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n STRIPE_SECRET_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n STRIPE_PUBLISHABLE_KEY: ${{ secrets.STRIPE_PUBLISHABLE_KEY }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00015", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Twilio Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `your_auth_token...` (example)\n3. Update: `TWILIO_AUTH_TOKEN=`\n4. Test, then revoke old key\n\nThe key `your_auth_token...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00016", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nMONGO_URI=mongodb://user:password@localhost:27017/testdb\nMONGO_DB_NAME=testdb\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00017", "source": "hard_negatives", "source_license": "generated", "text": "// Firebase SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\", // Replace with your key\n secret: \"my-project-12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.FIREBASE_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00018", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: slack-creds\nstringData:\n slack_bot_token: \"\"\n slack_signing_secret: \"\"\n# Example format: xoxb-not-a-real-toke...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00019", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n TWILIO_AUTH_TOKEN: your_auth_token_here\n TWILIO_ACCOUNT_SID: ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00020", "source": "hard_negatives", "source_license": "generated", "text": "# Stripe Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://stripe.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport STRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nexport STRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = stripe.Client(api_key=\"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00021", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate GitHub Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `ghp_xxxxxxxxxxx...` (example)\n3. Update: `GITHUB_TOKEN=`\n4. Test, then revoke old key\n\nThe key `ghp_xxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00022", "source": "hard_negatives", "source_license": "generated", "text": "// GitHub SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.GITHUB_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00023", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Slack?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SLACK_BOT_TOKEN\", \"xoxb-not-a-real-token-placeholder\")\n```\n\nDefault `xoxb-not-a-real-token-placeholder` is the **example key** \u2014 won't work.\nGet real key from https://slack.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00024", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_SENDGRID_API_KEY = \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_SENDGRID_FROM = \"noreply@example.com\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.sendgrid_key\", MOCK_SENDGRID_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00025", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SENDGRID_API_KEY: SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\n SENDGRID_FROM: noreply@example.com\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00026", "source": "hard_negatives", "source_license": "generated", "text": "// Slack SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"xoxb-not-a-real-token-placeholder\", // Replace with your key\n secret: \"not-real\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SLACK_BOT_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00027", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nOPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nOPENAI_ORG_ID=org-xxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00028", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_GITHUB_TOKEN = \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_GITHUB_APP_ID = \"12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.github_key\", MOCK_GITHUB_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00029", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Firebase Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AIzaSyXXXXXXXXX...` (example)\n3. Update: `FIREBASE_API_KEY=`\n4. Test, then revoke old key\n\nThe key `AIzaSyXXXXXXXXX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00030", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n ANTHROPIC_API_KEY: sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n ANTHROPIC_MODEL: default\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00031", "source": "hard_negatives", "source_license": "generated", "text": "# SendGrid Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://sendgrid.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nexport SENDGRID_FROM=noreply@example.com\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = sendgrid.Client(api_key=\"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00032", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}\n AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00033", "source": "hard_negatives", "source_license": "generated", "text": "// Slack SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"xoxb-not-a-real-token-placeholder\", // Replace with your key\n secret: \"not-real\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SLACK_BOT_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00034", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n TWILIO_AUTH_TOKEN: ${{ secrets.TWILIO_AUTH_TOKEN }}\n TWILIO_ACCOUNT_SID: ${{ secrets.TWILIO_ACCOUNT_SID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00035", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"mongodb\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00036", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_MONGO_URI = \"mongodb://user:password@localhost:27017/testdb\"\nMOCK_MONGO_DB_NAME = \"testdb\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.mongodb_key\", MOCK_MONGO_URI):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00037", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n OPENAI_API_KEY: sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n OPENAI_ORG_ID: org-xxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00038", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nANTHROPIC_MODEL=default\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00039", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"twilio\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00040", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n FIREBASE_API_KEY: ${{ secrets.FIREBASE_API_KEY }}\n FIREBASE_PROJECT_ID: ${{ secrets.FIREBASE_PROJECT_ID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00041", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nOPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nOPENAI_ORG_ID=org-xxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00042", "source": "hard_negatives", "source_license": "generated", "text": "# Stripe Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://stripe.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport STRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nexport STRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = stripe.Client(api_key=\"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00043", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_OPENAI_API_KEY = \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_OPENAI_ORG_ID = \"org-xxxxxxxxxxxx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.openai_key\", MOCK_OPENAI_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00044", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: firebase-creds\nstringData:\n firebase_api_key: \"\"\n firebase_project_id: \"\"\n# Example format: AIzaSyXXXXXXXXXXXXXX...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00045", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"firebase\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00046", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nMONGO_URI=mongodb://user:password@localhost:27017/testdb\nMONGO_DB_NAME=testdb\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00047", "source": "hard_negatives", "source_license": "generated", "text": "# Anthropic Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://anthropic.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport ANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport ANTHROPIC_MODEL=default\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = anthropic.Client(api_key=\"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00048", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSTRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nSTRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00049", "source": "hard_negatives", "source_license": "generated", "text": "// SendGrid SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"noreply@example.com\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SENDGRID_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00050", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_FIREBASE_API_KEY = \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\"\nMOCK_FIREBASE_PROJECT_ID = \"my-project-12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.firebase_key\", MOCK_FIREBASE_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00051", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate AWS Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AKIAIOSFODNN7EX...` (example)\n3. Update: `AWS_ACCESS_KEY_ID=`\n4. Test, then revoke old key\n\nThe key `AKIAIOSFODNN7EX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00052", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nOPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nOPENAI_ORG_ID=org-xxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00053", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nSLACK_SIGNING_SECRET=not-real\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00054", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_GITHUB_TOKEN = \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_GITHUB_APP_ID = \"12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.github_key\", MOCK_GITHUB_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00055", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nOPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nOPENAI_ORG_ID=org-xxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00056", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: aws-creds\nstringData:\n aws_access_key_id: \"\"\n aws_secret_access_key: \"\"\n# Example format: AKIAIOSFODNN7EXAMPLE...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00057", "source": "hard_negatives", "source_license": "generated", "text": "# MongoDB Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://mongodb.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport MONGO_URI=mongodb://user:password@localhost:27017/testdb\nexport MONGO_DB_NAME=testdb\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = mongodb.Client(api_key=\"mongodb://user:password@localhost:27017/testdb\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00058", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate SendGrid Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `SG.xxxxxxxxxxxx...` (example)\n3. Update: `SENDGRID_API_KEY=`\n4. Test, then revoke old key\n\nThe key `SG.xxxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00059", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n AWS_ACCESS_KEY_ID: AKIAIOSFODNN7EXAMPLE\n AWS_SECRET_ACCESS_KEY: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00060", "source": "hard_negatives", "source_license": "generated", "text": "// Stripe SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\", // Replace with your key\n secret: \"pk_test_TYooMQauvdEDq54NiTphI7jx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.STRIPE_SECRET_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00061", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00062", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_OPENAI_API_KEY = \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_OPENAI_ORG_ID = \"org-xxxxxxxxxxxx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.openai_key\", MOCK_OPENAI_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00063", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nMONGO_URI=mongodb://user:password@localhost:27017/testdb\nMONGO_DB_NAME=testdb\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00064", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nSLACK_SIGNING_SECRET=not-real\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00065", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n FIREBASE_API_KEY: AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n FIREBASE_PROJECT_ID: my-project-12345\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00066", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate GitHub Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `ghp_xxxxxxxxxxx...` (example)\n3. Update: `GITHUB_TOKEN=`\n4. Test, then revoke old key\n\nThe key `ghp_xxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00067", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure SendGrid?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SENDGRID_API_KEY\", \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://sendgrid.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00068", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00069", "source": "hard_negatives", "source_license": "generated", "text": "// GitHub SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.GITHUB_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00070", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: aws-creds\nstringData:\n aws_access_key_id: \"\"\n aws_secret_access_key: \"\"\n# Example format: AKIAIOSFODNN7EXAMPLE...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00071", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: github-creds\nstringData:\n github_token: \"\"\n github_app_id: \"\"\n# Example format: ghp_xxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00072", "source": "hard_negatives", "source_license": "generated", "text": "// AWS SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AKIAIOSFODNN7EXAMPLE\", // Replace with your key\n secret: \"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.AWS_ACCESS_KEY_ID", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00073", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n AWS_ACCESS_KEY_ID: AKIAIOSFODNN7EXAMPLE\n AWS_SECRET_ACCESS_KEY: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00074", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}\n AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00075", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n ANTHROPIC_API_KEY: sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n ANTHROPIC_MODEL: default\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00076", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00077", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: openai-creds\nstringData:\n openai_api_key: \"\"\n openai_org_id: \"\"\n# Example format: sk-proj-xxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00078", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00079", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n FIREBASE_API_KEY: AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n FIREBASE_PROJECT_ID: my-project-12345\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00080", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"stripe\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00081", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"firebase\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00082", "source": "hard_negatives", "source_license": "generated", "text": "// AWS SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AKIAIOSFODNN7EXAMPLE\", // Replace with your key\n secret: \"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.AWS_ACCESS_KEY_ID", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00083", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n FIREBASE_API_KEY: ${{ secrets.FIREBASE_API_KEY }}\n FIREBASE_PROJECT_ID: ${{ secrets.FIREBASE_PROJECT_ID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00084", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n GITHUB_TOKEN: ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n GITHUB_APP_ID: 12345\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00085", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Anthropic?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"ANTHROPIC_API_KEY\", \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://anthropic.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00086", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_FIREBASE_API_KEY = \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\"\nMOCK_FIREBASE_PROJECT_ID = \"my-project-12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.firebase_key\", MOCK_FIREBASE_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00087", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00088", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nMONGO_URI=mongodb://user:password@localhost:27017/testdb\nMONGO_DB_NAME=testdb\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00089", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nAWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE\nAWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00090", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n STRIPE_SECRET_KEY: sk_test_4eC39HqLyjWDarjtT1zdp7dc\n STRIPE_PUBLISHABLE_KEY: pk_test_TYooMQauvdEDq54NiTphI7jx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00091", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Firebase?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"FIREBASE_API_KEY\", \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\")\n```\n\nDefault `AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX` is the **example key** \u2014 won't work.\nGet real key from https://firebase.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00092", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"github\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00093", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"openai\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00094", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Firebase Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AIzaSyXXXXXXXXX...` (example)\n3. Update: `FIREBASE_API_KEY=`\n4. Test, then revoke old key\n\nThe key `AIzaSyXXXXXXXXX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00095", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"slack\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00096", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Anthropic?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"ANTHROPIC_API_KEY\", \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://anthropic.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00097", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate GitHub Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `ghp_xxxxxxxxxxx...` (example)\n3. Update: `GITHUB_TOKEN=`\n4. Test, then revoke old key\n\nThe key `ghp_xxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00098", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: aws-creds\nstringData:\n aws_access_key_id: \"\"\n aws_secret_access_key: \"\"\n# Example format: AKIAIOSFODNN7EXAMPLE...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00099", "source": "hard_negatives", "source_license": "generated", "text": "# Anthropic Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://anthropic.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport ANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport ANTHROPIC_MODEL=default\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = anthropic.Client(api_key=\"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00100", "source": "hard_negatives", "source_license": "generated", "text": "# SendGrid Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://sendgrid.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nexport SENDGRID_FROM=noreply@example.com\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = sendgrid.Client(api_key=\"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00101", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Twilio?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"TWILIO_AUTH_TOKEN\", \"your_auth_token_here\")\n```\n\nDefault `your_auth_token_here` is the **example key** \u2014 won't work.\nGet real key from https://twilio.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00102", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_ANTHROPIC_API_KEY = \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_ANTHROPIC_MODEL = \"default\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.anthropic_key\", MOCK_ANTHROPIC_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00103", "source": "hard_negatives", "source_license": "generated", "text": "// Anthropic SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"default\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.ANTHROPIC_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00104", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: stripe-creds\nstringData:\n stripe_secret_key: \"\"\n stripe_publishable_key: \"\"\n# Example format: sk_test_4eC39HqLyjWD...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00105", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"github\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00106", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n TWILIO_AUTH_TOKEN: your_auth_token_here\n TWILIO_ACCOUNT_SID: ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00107", "source": "hard_negatives", "source_license": "generated", "text": "# Twilio Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://twilio.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport TWILIO_AUTH_TOKEN=your_auth_token_here\nexport TWILIO_ACCOUNT_SID=ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = twilio.Client(api_key=\"your_auth_token_here\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00108", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"stripe\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00109", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: twilio-creds\nstringData:\n twilio_auth_token: \"\"\n twilio_account_sid: \"\"\n# Example format: your_auth_token_here...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00110", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate SendGrid Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `SG.xxxxxxxxxxxx...` (example)\n3. Update: `SENDGRID_API_KEY=`\n4. Test, then revoke old key\n\nThe key `SG.xxxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00111", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SENDGRID_API_KEY: SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\n SENDGRID_FROM: noreply@example.com\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00112", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_FIREBASE_API_KEY = \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\"\nMOCK_FIREBASE_PROJECT_ID = \"my-project-12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.firebase_key\", MOCK_FIREBASE_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00113", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Slack?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SLACK_BOT_TOKEN\", \"xoxb-not-a-real-token-placeholder\")\n```\n\nDefault `xoxb-not-a-real-token-placeholder` is the **example key** \u2014 won't work.\nGet real key from https://slack.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00114", "source": "hard_negatives", "source_license": "generated", "text": "# Stripe Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://stripe.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport STRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nexport STRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = stripe.Client(api_key=\"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00115", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: twilio-creds\nstringData:\n twilio_auth_token: \"\"\n twilio_account_sid: \"\"\n# Example format: your_auth_token_here...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00116", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSTRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nSTRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00117", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Anthropic Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk-ant-xxxxxxxx...` (example)\n3. Update: `ANTHROPIC_API_KEY=`\n4. Test, then revoke old key\n\nThe key `sk-ant-xxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00118", "source": "hard_negatives", "source_license": "generated", "text": "// SendGrid SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"noreply@example.com\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SENDGRID_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00119", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate SendGrid Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `SG.xxxxxxxxxxxx...` (example)\n3. Update: `SENDGRID_API_KEY=`\n4. Test, then revoke old key\n\nThe key `SG.xxxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00120", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nMONGO_URI=mongodb://user:password@localhost:27017/testdb\nMONGO_DB_NAME=testdb\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00121", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: slack-creds\nstringData:\n slack_bot_token: \"\"\n slack_signing_secret: \"\"\n# Example format: xoxb-not-a-real-toke...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00122", "source": "hard_negatives", "source_license": "generated", "text": "# Anthropic Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://anthropic.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport ANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport ANTHROPIC_MODEL=default\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = anthropic.Client(api_key=\"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00123", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Anthropic Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk-ant-xxxxxxxx...` (example)\n3. Update: `ANTHROPIC_API_KEY=`\n4. Test, then revoke old key\n\nThe key `sk-ant-xxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00124", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_STRIPE_SECRET_KEY = \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\"\nMOCK_STRIPE_PUBLISHABLE_KEY = \"pk_test_TYooMQauvdEDq54NiTphI7jx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.stripe_key\", MOCK_STRIPE_SECRET_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00125", "source": "hard_negatives", "source_license": "generated", "text": "// Stripe SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\", // Replace with your key\n secret: \"pk_test_TYooMQauvdEDq54NiTphI7jx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.STRIPE_SECRET_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00126", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_ANTHROPIC_API_KEY = \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_ANTHROPIC_MODEL = \"default\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.anthropic_key\", MOCK_ANTHROPIC_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00127", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: slack-creds\nstringData:\n slack_bot_token: \"\"\n slack_signing_secret: \"\"\n# Example format: xoxb-not-a-real-toke...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00128", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SENDGRID_API_KEY: SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\n SENDGRID_FROM: noreply@example.com\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00129", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nSLACK_SIGNING_SECRET=not-real\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00130", "source": "hard_negatives", "source_license": "generated", "text": "# Slack Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://slack.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nexport SLACK_SIGNING_SECRET=not-real\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = slack.Client(api_key=\"xoxb-not-a-real-token-placeholder\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00131", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Firebase Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AIzaSyXXXXXXXXX...` (example)\n3. Update: `FIREBASE_API_KEY=`\n4. Test, then revoke old key\n\nThe key `AIzaSyXXXXXXXXX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00132", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}\n AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00133", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_SLACK_BOT_TOKEN = \"xoxb-not-a-real-token-placeholder\"\nMOCK_SLACK_SIGNING_SECRET = \"not-real\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.slack_key\", MOCK_SLACK_BOT_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00134", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nMONGO_URI=mongodb://user:password@localhost:27017/testdb\nMONGO_DB_NAME=testdb\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00135", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nFIREBASE_API_KEY=AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nFIREBASE_PROJECT_ID=my-project-12345\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00136", "source": "hard_negatives", "source_license": "generated", "text": "// Stripe SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\", // Replace with your key\n secret: \"pk_test_TYooMQauvdEDq54NiTphI7jx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.STRIPE_SECRET_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00137", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nOPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nOPENAI_ORG_ID=org-xxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00138", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: sendgrid-creds\nstringData:\n sendgrid_api_key: \"\"\n sendgrid_from: \"\"\n# Example format: SG.xxxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00139", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"openai\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00140", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate AWS Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AKIAIOSFODNN7EX...` (example)\n3. Update: `AWS_ACCESS_KEY_ID=`\n4. Test, then revoke old key\n\nThe key `AKIAIOSFODNN7EX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00141", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}\n AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00142", "source": "hard_negatives", "source_license": "generated", "text": "// GitHub SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.GITHUB_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00143", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"anthropic\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00144", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n OPENAI_API_KEY: sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n OPENAI_ORG_ID: org-xxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00145", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"openai\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00146", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n OPENAI_API_KEY: ${{ secrets.OPENAI_API_KEY }}\n OPENAI_ORG_ID: ${{ secrets.OPENAI_ORG_ID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00147", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate GitHub Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `ghp_xxxxxxxxxxx...` (example)\n3. Update: `GITHUB_TOKEN=`\n4. Test, then revoke old key\n\nThe key `ghp_xxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00148", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"stripe\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00149", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00150", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n MONGO_URI: ${{ secrets.MONGO_URI }}\n MONGO_DB_NAME: ${{ secrets.MONGO_DB_NAME }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00151", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n GITHUB_TOKEN: ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n GITHUB_APP_ID: 12345\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00152", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"github\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00153", "source": "hard_negatives", "source_license": "generated", "text": "// Slack SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"xoxb-not-a-real-token-placeholder\", // Replace with your key\n secret: \"not-real\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SLACK_BOT_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00154", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nSENDGRID_FROM=noreply@example.com\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00155", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n ANTHROPIC_API_KEY: ${{ secrets.ANTHROPIC_API_KEY }}\n ANTHROPIC_MODEL: ${{ secrets.ANTHROPIC_MODEL }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00156", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Stripe Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk_test_4eC39Hq...` (example)\n3. Update: `STRIPE_SECRET_KEY=`\n4. Test, then revoke old key\n\nThe key `sk_test_4eC39Hq...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00157", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Twilio Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `your_auth_token...` (example)\n3. Update: `TWILIO_AUTH_TOKEN=`\n4. Test, then revoke old key\n\nThe key `your_auth_token...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00158", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: stripe-creds\nstringData:\n stripe_secret_key: \"\"\n stripe_publishable_key: \"\"\n# Example format: sk_test_4eC39HqLyjWD...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00159", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n SENDGRID_API_KEY: ${{ secrets.SENDGRID_API_KEY }}\n SENDGRID_FROM: ${{ secrets.SENDGRID_FROM }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00160", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nTWILIO_AUTH_TOKEN=your_auth_token_here\nTWILIO_ACCOUNT_SID=ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00161", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: firebase-creds\nstringData:\n firebase_api_key: \"\"\n firebase_project_id: \"\"\n# Example format: AIzaSyXXXXXXXXXXXXXX...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00162", "source": "hard_negatives", "source_license": "generated", "text": "# Slack Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://slack.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nexport SLACK_SIGNING_SECRET=not-real\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = slack.Client(api_key=\"xoxb-not-a-real-token-placeholder\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00163", "source": "hard_negatives", "source_license": "generated", "text": "# Firebase Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://firebase.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport FIREBASE_API_KEY=AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nexport FIREBASE_PROJECT_ID=my-project-12345\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = firebase.Client(api_key=\"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00164", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n ANTHROPIC_API_KEY: sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n ANTHROPIC_MODEL: default\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00165", "source": "hard_negatives", "source_license": "generated", "text": "// Firebase SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\", // Replace with your key\n secret: \"my-project-12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.FIREBASE_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00166", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: sendgrid-creds\nstringData:\n sendgrid_api_key: \"\"\n sendgrid_from: \"\"\n# Example format: SG.xxxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00167", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Stripe Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk_test_4eC39Hq...` (example)\n3. Update: `STRIPE_SECRET_KEY=`\n4. Test, then revoke old key\n\nThe key `sk_test_4eC39Hq...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00168", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"slack\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00169", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Firebase Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AIzaSyXXXXXXXXX...` (example)\n3. Update: `FIREBASE_API_KEY=`\n4. Test, then revoke old key\n\nThe key `AIzaSyXXXXXXXXX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00170", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n OPENAI_API_KEY: sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n OPENAI_ORG_ID: org-xxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00171", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_FIREBASE_API_KEY = \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\"\nMOCK_FIREBASE_PROJECT_ID = \"my-project-12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.firebase_key\", MOCK_FIREBASE_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00172", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Twilio Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `your_auth_token...` (example)\n3. Update: `TWILIO_AUTH_TOKEN=`\n4. Test, then revoke old key\n\nThe key `your_auth_token...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00173", "source": "hard_negatives", "source_license": "generated", "text": "# Anthropic Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://anthropic.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport ANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport ANTHROPIC_MODEL=default\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = anthropic.Client(api_key=\"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00174", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SLACK_BOT_TOKEN: xoxb-not-a-real-token-placeholder\n SLACK_SIGNING_SECRET: not-real\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00175", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: twilio-creds\nstringData:\n twilio_auth_token: \"\"\n twilio_account_sid: \"\"\n# Example format: your_auth_token_here...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00176", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure SendGrid?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SENDGRID_API_KEY\", \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://sendgrid.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00177", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00178", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_MONGO_URI = \"mongodb://user:password@localhost:27017/testdb\"\nMOCK_MONGO_DB_NAME = \"testdb\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.mongodb_key\", MOCK_MONGO_URI):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00179", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Stripe Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk_test_4eC39Hq...` (example)\n3. Update: `STRIPE_SECRET_KEY=`\n4. Test, then revoke old key\n\nThe key `sk_test_4eC39Hq...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00180", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n TWILIO_AUTH_TOKEN: ${{ secrets.TWILIO_AUTH_TOKEN }}\n TWILIO_ACCOUNT_SID: ${{ secrets.TWILIO_ACCOUNT_SID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00181", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate GitHub Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `ghp_xxxxxxxxxxx...` (example)\n3. Update: `GITHUB_TOKEN=`\n4. Test, then revoke old key\n\nThe key `ghp_xxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00182", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_GITHUB_TOKEN = \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_GITHUB_APP_ID = \"12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.github_key\", MOCK_GITHUB_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00183", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n AWS_ACCESS_KEY_ID: AKIAIOSFODNN7EXAMPLE\n AWS_SECRET_ACCESS_KEY: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00184", "source": "hard_negatives", "source_license": "generated", "text": "// Twilio SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"your_auth_token_here\", // Replace with your key\n secret: \"ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.TWILIO_AUTH_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00185", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: firebase-creds\nstringData:\n firebase_api_key: \"\"\n firebase_project_id: \"\"\n# Example format: AIzaSyXXXXXXXXXXXXXX...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00186", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Firebase?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"FIREBASE_API_KEY\", \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\")\n```\n\nDefault `AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX` is the **example key** \u2014 won't work.\nGet real key from https://firebase.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00187", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_GITHUB_TOKEN = \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_GITHUB_APP_ID = \"12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.github_key\", MOCK_GITHUB_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00188", "source": "hard_negatives", "source_license": "generated", "text": "// AWS SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AKIAIOSFODNN7EXAMPLE\", // Replace with your key\n secret: \"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.AWS_ACCESS_KEY_ID", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00189", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_GITHUB_TOKEN = \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_GITHUB_APP_ID = \"12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.github_key\", MOCK_GITHUB_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00190", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Anthropic?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"ANTHROPIC_API_KEY\", \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://anthropic.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00191", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n ANTHROPIC_API_KEY: sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n ANTHROPIC_MODEL: default\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00192", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_MONGO_URI = \"mongodb://user:password@localhost:27017/testdb\"\nMOCK_MONGO_DB_NAME = \"testdb\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.mongodb_key\", MOCK_MONGO_URI):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00193", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nANTHROPIC_MODEL=default\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00194", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure SendGrid?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SENDGRID_API_KEY\", \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://sendgrid.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00195", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"anthropic\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00196", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_MONGO_URI = \"mongodb://user:password@localhost:27017/testdb\"\nMOCK_MONGO_DB_NAME = \"testdb\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.mongodb_key\", MOCK_MONGO_URI):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00197", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure MongoDB?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"MONGO_URI\", \"mongodb://user:password@localhost:27017/testdb\")\n```\n\nDefault `mongodb://user:password@localhost:27017/testdb` is the **example key** \u2014 won't work.\nGet real key from https://mongodb.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00198", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate GitHub Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `ghp_xxxxxxxxxxx...` (example)\n3. Update: `GITHUB_TOKEN=`\n4. Test, then revoke old key\n\nThe key `ghp_xxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00199", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00200", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00201", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SLACK_BOT_TOKEN: xoxb-not-a-real-token-placeholder\n SLACK_SIGNING_SECRET: not-real\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00202", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n SENDGRID_API_KEY: ${{ secrets.SENDGRID_API_KEY }}\n SENDGRID_FROM: ${{ secrets.SENDGRID_FROM }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00203", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_STRIPE_SECRET_KEY = \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\"\nMOCK_STRIPE_PUBLISHABLE_KEY = \"pk_test_TYooMQauvdEDq54NiTphI7jx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.stripe_key\", MOCK_STRIPE_SECRET_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00204", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"github\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00205", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n OPENAI_API_KEY: sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n OPENAI_ORG_ID: org-xxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00206", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"firebase\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00207", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Anthropic?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"ANTHROPIC_API_KEY\", \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://anthropic.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00208", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n AWS_ACCESS_KEY_ID: AKIAIOSFODNN7EXAMPLE\n AWS_SECRET_ACCESS_KEY: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00209", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: firebase-creds\nstringData:\n firebase_api_key: \"\"\n firebase_project_id: \"\"\n# Example format: AIzaSyXXXXXXXXXXXXXX...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00210", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: aws-creds\nstringData:\n aws_access_key_id: \"\"\n aws_secret_access_key: \"\"\n# Example format: AKIAIOSFODNN7EXAMPLE...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00211", "source": "hard_negatives", "source_license": "generated", "text": "# MongoDB Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://mongodb.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport MONGO_URI=mongodb://user:password@localhost:27017/testdb\nexport MONGO_DB_NAME=testdb\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = mongodb.Client(api_key=\"mongodb://user:password@localhost:27017/testdb\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00212", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"slack\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00213", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nANTHROPIC_MODEL=default\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00214", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure GitHub?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"GITHUB_TOKEN\", \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://github.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00215", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"slack\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00216", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"aws\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00217", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_FIREBASE_API_KEY = \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\"\nMOCK_FIREBASE_PROJECT_ID = \"my-project-12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.firebase_key\", MOCK_FIREBASE_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00218", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: openai-creds\nstringData:\n openai_api_key: \"\"\n openai_org_id: \"\"\n# Example format: sk-proj-xxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00219", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"aws\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00220", "source": "hard_negatives", "source_license": "generated", "text": "# Twilio Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://twilio.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport TWILIO_AUTH_TOKEN=your_auth_token_here\nexport TWILIO_ACCOUNT_SID=ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = twilio.Client(api_key=\"your_auth_token_here\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00221", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_FIREBASE_API_KEY = \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\"\nMOCK_FIREBASE_PROJECT_ID = \"my-project-12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.firebase_key\", MOCK_FIREBASE_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00222", "source": "hard_negatives", "source_license": "generated", "text": "# OpenAI Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://openai.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport OPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport OPENAI_ORG_ID=org-xxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = openai.Client(api_key=\"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00223", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n FIREBASE_API_KEY: ${{ secrets.FIREBASE_API_KEY }}\n FIREBASE_PROJECT_ID: ${{ secrets.FIREBASE_PROJECT_ID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00224", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n MONGO_URI: ${{ secrets.MONGO_URI }}\n MONGO_DB_NAME: ${{ secrets.MONGO_DB_NAME }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00225", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Firebase Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AIzaSyXXXXXXXXX...` (example)\n3. Update: `FIREBASE_API_KEY=`\n4. Test, then revoke old key\n\nThe key `AIzaSyXXXXXXXXX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00226", "source": "hard_negatives", "source_license": "generated", "text": "// Slack SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"xoxb-not-a-real-token-placeholder\", // Replace with your key\n secret: \"not-real\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SLACK_BOT_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00227", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nAWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE\nAWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00228", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SENDGRID_API_KEY: SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\n SENDGRID_FROM: noreply@example.com\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00229", "source": "hard_negatives", "source_license": "generated", "text": "# Stripe Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://stripe.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport STRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nexport STRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = stripe.Client(api_key=\"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00230", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n GITHUB_TOKEN: ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n GITHUB_APP_ID: 12345\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00231", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_TWILIO_AUTH_TOKEN = \"your_auth_token_here\"\nMOCK_TWILIO_ACCOUNT_SID = \"ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.twilio_key\", MOCK_TWILIO_AUTH_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00232", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure OpenAI?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"OPENAI_API_KEY\", \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://openai.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00233", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: stripe-creds\nstringData:\n stripe_secret_key: \"\"\n stripe_publishable_key: \"\"\n# Example format: sk_test_4eC39HqLyjWD...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00234", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate MongoDB Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `mongodb://user:...` (example)\n3. Update: `MONGO_URI=`\n4. Test, then revoke old key\n\nThe key `mongodb://user:...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00235", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: openai-creds\nstringData:\n openai_api_key: \"\"\n openai_org_id: \"\"\n# Example format: sk-proj-xxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00236", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_STRIPE_SECRET_KEY = \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\"\nMOCK_STRIPE_PUBLISHABLE_KEY = \"pk_test_TYooMQauvdEDq54NiTphI7jx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.stripe_key\", MOCK_STRIPE_SECRET_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00237", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: stripe-creds\nstringData:\n stripe_secret_key: \"\"\n stripe_publishable_key: \"\"\n# Example format: sk_test_4eC39HqLyjWD...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00238", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: slack-creds\nstringData:\n slack_bot_token: \"\"\n slack_signing_secret: \"\"\n# Example format: xoxb-not-a-real-toke...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00239", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"firebase\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00240", "source": "hard_negatives", "source_license": "generated", "text": "// GitHub SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.GITHUB_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00241", "source": "hard_negatives", "source_license": "generated", "text": "// GitHub SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.GITHUB_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00242", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: slack-creds\nstringData:\n slack_bot_token: \"\"\n slack_signing_secret: \"\"\n# Example format: xoxb-not-a-real-toke...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00243", "source": "hard_negatives", "source_license": "generated", "text": "# Twilio Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://twilio.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport TWILIO_AUTH_TOKEN=your_auth_token_here\nexport TWILIO_ACCOUNT_SID=ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = twilio.Client(api_key=\"your_auth_token_here\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00244", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"anthropic\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00245", "source": "hard_negatives", "source_license": "generated", "text": "// SendGrid SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"noreply@example.com\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SENDGRID_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00246", "source": "hard_negatives", "source_license": "generated", "text": "# SendGrid Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://sendgrid.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nexport SENDGRID_FROM=noreply@example.com\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = sendgrid.Client(api_key=\"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00247", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00248", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure SendGrid?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SENDGRID_API_KEY\", \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://sendgrid.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00249", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"openai\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00250", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Anthropic Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk-ant-xxxxxxxx...` (example)\n3. Update: `ANTHROPIC_API_KEY=`\n4. Test, then revoke old key\n\nThe key `sk-ant-xxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00251", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Anthropic?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"ANTHROPIC_API_KEY\", \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://anthropic.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00252", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: firebase-creds\nstringData:\n firebase_api_key: \"\"\n firebase_project_id: \"\"\n# Example format: AIzaSyXXXXXXXXXXXXXX...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00253", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SENDGRID_API_KEY: SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\n SENDGRID_FROM: noreply@example.com\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00254", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Slack?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SLACK_BOT_TOKEN\", \"xoxb-not-a-real-token-placeholder\")\n```\n\nDefault `xoxb-not-a-real-token-placeholder` is the **example key** \u2014 won't work.\nGet real key from https://slack.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00255", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: mongodb-creds\nstringData:\n mongo_uri: \"\"\n mongo_db_name: \"\"\n# Example format: mongodb://user:passw...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00256", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n FIREBASE_API_KEY: ${{ secrets.FIREBASE_API_KEY }}\n FIREBASE_PROJECT_ID: ${{ secrets.FIREBASE_PROJECT_ID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00257", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n MONGO_URI: ${{ secrets.MONGO_URI }}\n MONGO_DB_NAME: ${{ secrets.MONGO_DB_NAME }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00258", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00259", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n SLACK_BOT_TOKEN: ${{ secrets.SLACK_BOT_TOKEN }}\n SLACK_SIGNING_SECRET: ${{ secrets.SLACK_SIGNING_SECRET }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00260", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Twilio Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `your_auth_token...` (example)\n3. Update: `TWILIO_AUTH_TOKEN=`\n4. Test, then revoke old key\n\nThe key `your_auth_token...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00261", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nAWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE\nAWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00262", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n STRIPE_SECRET_KEY: sk_test_4eC39HqLyjWDarjtT1zdp7dc\n STRIPE_PUBLISHABLE_KEY: pk_test_TYooMQauvdEDq54NiTphI7jx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00263", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Firebase?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"FIREBASE_API_KEY\", \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\")\n```\n\nDefault `AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX` is the **example key** \u2014 won't work.\nGet real key from https://firebase.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00264", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure GitHub?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"GITHUB_TOKEN\", \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://github.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00265", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure MongoDB?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"MONGO_URI\", \"mongodb://user:password@localhost:27017/testdb\")\n```\n\nDefault `mongodb://user:password@localhost:27017/testdb` is the **example key** \u2014 won't work.\nGet real key from https://mongodb.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00266", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Stripe Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk_test_4eC39Hq...` (example)\n3. Update: `STRIPE_SECRET_KEY=`\n4. Test, then revoke old key\n\nThe key `sk_test_4eC39Hq...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00267", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n FIREBASE_API_KEY: AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n FIREBASE_PROJECT_ID: my-project-12345\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00268", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n TWILIO_AUTH_TOKEN: ${{ secrets.TWILIO_AUTH_TOKEN }}\n TWILIO_ACCOUNT_SID: ${{ secrets.TWILIO_ACCOUNT_SID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00269", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nANTHROPIC_MODEL=default\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00270", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nFIREBASE_API_KEY=AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nFIREBASE_PROJECT_ID=my-project-12345\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00271", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure SendGrid?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SENDGRID_API_KEY\", \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://sendgrid.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00272", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Slack Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `xoxb-not-a-real...` (example)\n3. Update: `SLACK_BOT_TOKEN=`\n4. Test, then revoke old key\n\nThe key `xoxb-not-a-real...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00273", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n STRIPE_SECRET_KEY: sk_test_4eC39HqLyjWDarjtT1zdp7dc\n STRIPE_PUBLISHABLE_KEY: pk_test_TYooMQauvdEDq54NiTphI7jx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00274", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSTRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nSTRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00275", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n OPENAI_API_KEY: sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n OPENAI_ORG_ID: org-xxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00276", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate MongoDB Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `mongodb://user:...` (example)\n3. Update: `MONGO_URI=`\n4. Test, then revoke old key\n\nThe key `mongodb://user:...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00277", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nTWILIO_AUTH_TOKEN=your_auth_token_here\nTWILIO_ACCOUNT_SID=ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00278", "source": "hard_negatives", "source_license": "generated", "text": "// Slack SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"xoxb-not-a-real-token-placeholder\", // Replace with your key\n secret: \"not-real\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SLACK_BOT_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00279", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SLACK_BOT_TOKEN: xoxb-not-a-real-token-placeholder\n SLACK_SIGNING_SECRET: not-real\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00280", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate OpenAI Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk-proj-xxxxxxx...` (example)\n3. Update: `OPENAI_API_KEY=`\n4. Test, then revoke old key\n\nThe key `sk-proj-xxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00281", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_ANTHROPIC_API_KEY = \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_ANTHROPIC_MODEL = \"default\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.anthropic_key\", MOCK_ANTHROPIC_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00282", "source": "hard_negatives", "source_license": "generated", "text": "# AWS Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://aws.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE\nexport AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = aws.Client(api_key=\"AKIAIOSFODNN7EXAMPLE\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00283", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_SLACK_BOT_TOKEN = \"xoxb-not-a-real-token-placeholder\"\nMOCK_SLACK_SIGNING_SECRET = \"not-real\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.slack_key\", MOCK_SLACK_BOT_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00284", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00285", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Twilio Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `your_auth_token...` (example)\n3. Update: `TWILIO_AUTH_TOKEN=`\n4. Test, then revoke old key\n\nThe key `your_auth_token...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00286", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure MongoDB?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"MONGO_URI\", \"mongodb://user:password@localhost:27017/testdb\")\n```\n\nDefault `mongodb://user:password@localhost:27017/testdb` is the **example key** \u2014 won't work.\nGet real key from https://mongodb.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00287", "source": "hard_negatives", "source_license": "generated", "text": "# OpenAI Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://openai.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport OPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport OPENAI_ORG_ID=org-xxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = openai.Client(api_key=\"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00288", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00289", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Firebase?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"FIREBASE_API_KEY\", \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\")\n```\n\nDefault `AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX` is the **example key** \u2014 won't work.\nGet real key from https://firebase.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00290", "source": "hard_negatives", "source_license": "generated", "text": "# Twilio Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://twilio.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport TWILIO_AUTH_TOKEN=your_auth_token_here\nexport TWILIO_ACCOUNT_SID=ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = twilio.Client(api_key=\"your_auth_token_here\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00291", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: openai-creds\nstringData:\n openai_api_key: \"\"\n openai_org_id: \"\"\n# Example format: sk-proj-xxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00292", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n STRIPE_SECRET_KEY: sk_test_4eC39HqLyjWDarjtT1zdp7dc\n STRIPE_PUBLISHABLE_KEY: pk_test_TYooMQauvdEDq54NiTphI7jx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00293", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"anthropic\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00294", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: twilio-creds\nstringData:\n twilio_auth_token: \"\"\n twilio_account_sid: \"\"\n# Example format: your_auth_token_here...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00295", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"anthropic\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00296", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate MongoDB Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `mongodb://user:...` (example)\n3. Update: `MONGO_URI=`\n4. Test, then revoke old key\n\nThe key `mongodb://user:...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00297", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Firebase Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AIzaSyXXXXXXXXX...` (example)\n3. Update: `FIREBASE_API_KEY=`\n4. Test, then revoke old key\n\nThe key `AIzaSyXXXXXXXXX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00298", "source": "hard_negatives", "source_license": "generated", "text": "# Twilio Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://twilio.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport TWILIO_AUTH_TOKEN=your_auth_token_here\nexport TWILIO_ACCOUNT_SID=ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = twilio.Client(api_key=\"your_auth_token_here\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00299", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n STRIPE_SECRET_KEY: sk_test_4eC39HqLyjWDarjtT1zdp7dc\n STRIPE_PUBLISHABLE_KEY: pk_test_TYooMQauvdEDq54NiTphI7jx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00300", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate GitHub Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `ghp_xxxxxxxxxxx...` (example)\n3. Update: `GITHUB_TOKEN=`\n4. Test, then revoke old key\n\nThe key `ghp_xxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00301", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_STRIPE_SECRET_KEY = \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\"\nMOCK_STRIPE_PUBLISHABLE_KEY = \"pk_test_TYooMQauvdEDq54NiTphI7jx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.stripe_key\", MOCK_STRIPE_SECRET_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00302", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nOPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nOPENAI_ORG_ID=org-xxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00303", "source": "hard_negatives", "source_license": "generated", "text": "# OpenAI Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://openai.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport OPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport OPENAI_ORG_ID=org-xxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = openai.Client(api_key=\"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00304", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: mongodb-creds\nstringData:\n mongo_uri: \"\"\n mongo_db_name: \"\"\n# Example format: mongodb://user:passw...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00305", "source": "hard_negatives", "source_license": "generated", "text": "# Slack Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://slack.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nexport SLACK_SIGNING_SECRET=not-real\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = slack.Client(api_key=\"xoxb-not-a-real-token-placeholder\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00306", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Slack Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `xoxb-not-a-real...` (example)\n3. Update: `SLACK_BOT_TOKEN=`\n4. Test, then revoke old key\n\nThe key `xoxb-not-a-real...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00307", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00308", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate GitHub Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `ghp_xxxxxxxxxxx...` (example)\n3. Update: `GITHUB_TOKEN=`\n4. Test, then revoke old key\n\nThe key `ghp_xxxxxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00309", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n TWILIO_AUTH_TOKEN: your_auth_token_here\n TWILIO_ACCOUNT_SID: ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00310", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSTRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nSTRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00311", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate OpenAI Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk-proj-xxxxxxx...` (example)\n3. Update: `OPENAI_API_KEY=`\n4. Test, then revoke old key\n\nThe key `sk-proj-xxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00312", "source": "hard_negatives", "source_license": "generated", "text": "# Stripe Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://stripe.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport STRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nexport STRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = stripe.Client(api_key=\"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00313", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: slack-creds\nstringData:\n slack_bot_token: \"\"\n slack_signing_secret: \"\"\n# Example format: xoxb-not-a-real-toke...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00314", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Twilio Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `your_auth_token...` (example)\n3. Update: `TWILIO_AUTH_TOKEN=`\n4. Test, then revoke old key\n\nThe key `your_auth_token...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00315", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Stripe?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"STRIPE_SECRET_KEY\", \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\n```\n\nDefault `sk_test_4eC39HqLyjWDarjtT1zdp7dc` is the **example key** \u2014 won't work.\nGet real key from https://stripe.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00316", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"slack\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00317", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nANTHROPIC_MODEL=default\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00318", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00319", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"aws\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00320", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: sendgrid-creds\nstringData:\n sendgrid_api_key: \"\"\n sendgrid_from: \"\"\n# Example format: SG.xxxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00321", "source": "hard_negatives", "source_license": "generated", "text": "// AWS SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AKIAIOSFODNN7EXAMPLE\", // Replace with your key\n secret: \"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.AWS_ACCESS_KEY_ID", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00322", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: twilio-creds\nstringData:\n twilio_auth_token: \"\"\n twilio_account_sid: \"\"\n# Example format: your_auth_token_here...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00323", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: slack-creds\nstringData:\n slack_bot_token: \"\"\n slack_signing_secret: \"\"\n# Example format: xoxb-not-a-real-toke...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00324", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure OpenAI?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"OPENAI_API_KEY\", \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://openai.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00325", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate MongoDB Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `mongodb://user:...` (example)\n3. Update: `MONGO_URI=`\n4. Test, then revoke old key\n\nThe key `mongodb://user:...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00326", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"twilio\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00327", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00328", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"sendgrid\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00329", "source": "hard_negatives", "source_license": "generated", "text": "// SendGrid SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"noreply@example.com\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SENDGRID_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00330", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"sendgrid\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00331", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate MongoDB Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `mongodb://user:...` (example)\n3. Update: `MONGO_URI=`\n4. Test, then revoke old key\n\nThe key `mongodb://user:...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00332", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nFIREBASE_API_KEY=AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nFIREBASE_PROJECT_ID=my-project-12345\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00333", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00334", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n SLACK_BOT_TOKEN: ${{ secrets.SLACK_BOT_TOKEN }}\n SLACK_SIGNING_SECRET: ${{ secrets.SLACK_SIGNING_SECRET }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00335", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nFIREBASE_API_KEY=AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nFIREBASE_PROJECT_ID=my-project-12345\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00336", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Anthropic?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"ANTHROPIC_API_KEY\", \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://anthropic.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00337", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n AWS_ACCESS_KEY_ID: AKIAIOSFODNN7EXAMPLE\n AWS_SECRET_ACCESS_KEY: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00338", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: sendgrid-creds\nstringData:\n sendgrid_api_key: \"\"\n sendgrid_from: \"\"\n# Example format: SG.xxxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00339", "source": "hard_negatives", "source_license": "generated", "text": "# MongoDB Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://mongodb.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport MONGO_URI=mongodb://user:password@localhost:27017/testdb\nexport MONGO_DB_NAME=testdb\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = mongodb.Client(api_key=\"mongodb://user:password@localhost:27017/testdb\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00340", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nSLACK_SIGNING_SECRET=not-real\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00341", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Slack?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SLACK_BOT_TOKEN\", \"xoxb-not-a-real-token-placeholder\")\n```\n\nDefault `xoxb-not-a-real-token-placeholder` is the **example key** \u2014 won't work.\nGet real key from https://slack.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00342", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00343", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n TWILIO_AUTH_TOKEN: your_auth_token_here\n TWILIO_ACCOUNT_SID: ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00344", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate OpenAI Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk-proj-xxxxxxx...` (example)\n3. Update: `OPENAI_API_KEY=`\n4. Test, then revoke old key\n\nThe key `sk-proj-xxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00345", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nAWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE\nAWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00346", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n STRIPE_SECRET_KEY: sk_test_4eC39HqLyjWDarjtT1zdp7dc\n STRIPE_PUBLISHABLE_KEY: pk_test_TYooMQauvdEDq54NiTphI7jx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00347", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00348", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure OpenAI?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"OPENAI_API_KEY\", \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://openai.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00349", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nSLACK_SIGNING_SECRET=not-real\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00350", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"slack\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00351", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00352", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_ANTHROPIC_API_KEY = \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_ANTHROPIC_MODEL = \"default\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.anthropic_key\", MOCK_ANTHROPIC_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00353", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: github-creds\nstringData:\n github_token: \"\"\n github_app_id: \"\"\n# Example format: ghp_xxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00354", "source": "hard_negatives", "source_license": "generated", "text": "// OpenAI SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"org-xxxxxxxxxxxx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.OPENAI_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00355", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n FIREBASE_API_KEY: ${{ secrets.FIREBASE_API_KEY }}\n FIREBASE_PROJECT_ID: ${{ secrets.FIREBASE_PROJECT_ID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00356", "source": "hard_negatives", "source_license": "generated", "text": "# Slack Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://slack.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nexport SLACK_SIGNING_SECRET=not-real\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = slack.Client(api_key=\"xoxb-not-a-real-token-placeholder\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00357", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: slack-creds\nstringData:\n slack_bot_token: \"\"\n slack_signing_secret: \"\"\n# Example format: xoxb-not-a-real-toke...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00358", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_MONGO_URI = \"mongodb://user:password@localhost:27017/testdb\"\nMOCK_MONGO_DB_NAME = \"testdb\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.mongodb_key\", MOCK_MONGO_URI):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00359", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Anthropic?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"ANTHROPIC_API_KEY\", \"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://anthropic.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00360", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nSENDGRID_FROM=noreply@example.com\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00361", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Firebase?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"FIREBASE_API_KEY\", \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\")\n```\n\nDefault `AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX` is the **example key** \u2014 won't work.\nGet real key from https://firebase.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00362", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n GITHUB_TOKEN: ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n GITHUB_APP_ID: 12345\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00363", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n FIREBASE_API_KEY: AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n FIREBASE_PROJECT_ID: my-project-12345\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00364", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}\n AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00365", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"mongodb\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00366", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure OpenAI?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"OPENAI_API_KEY\", \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://openai.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00367", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nOPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nOPENAI_ORG_ID=org-xxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00368", "source": "hard_negatives", "source_license": "generated", "text": "// SendGrid SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"noreply@example.com\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SENDGRID_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00369", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSTRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nSTRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00370", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_AWS_ACCESS_KEY_ID = \"AKIAIOSFODNN7EXAMPLE\"\nMOCK_AWS_SECRET_ACCESS_KEY = \"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.aws_key\", MOCK_AWS_ACCESS_KEY_ID):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00371", "source": "hard_negatives", "source_license": "generated", "text": "// OpenAI SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"org-xxxxxxxxxxxx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.OPENAI_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00372", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n SLACK_BOT_TOKEN: ${{ secrets.SLACK_BOT_TOKEN }}\n SLACK_SIGNING_SECRET: ${{ secrets.SLACK_SIGNING_SECRET }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00373", "source": "hard_negatives", "source_license": "generated", "text": "// Firebase SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\", // Replace with your key\n secret: \"my-project-12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.FIREBASE_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00374", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"anthropic\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00375", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nMONGO_URI=mongodb://user:password@localhost:27017/testdb\nMONGO_DB_NAME=testdb\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00376", "source": "hard_negatives", "source_license": "generated", "text": "// Twilio SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"your_auth_token_here\", // Replace with your key\n secret: \"ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.TWILIO_AUTH_TOKEN", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00377", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SLACK_BOT_TOKEN: xoxb-not-a-real-token-placeholder\n SLACK_SIGNING_SECRET: not-real\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00378", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"stripe\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00379", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Stripe?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"STRIPE_SECRET_KEY\", \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\n```\n\nDefault `sk_test_4eC39HqLyjWDarjtT1zdp7dc` is the **example key** \u2014 won't work.\nGet real key from https://stripe.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00380", "source": "hard_negatives", "source_license": "generated", "text": "# Slack Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://slack.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nexport SLACK_SIGNING_SECRET=not-real\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = slack.Client(api_key=\"xoxb-not-a-real-token-placeholder\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00381", "source": "hard_negatives", "source_license": "generated", "text": "# SendGrid Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://sendgrid.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nexport SENDGRID_FROM=noreply@example.com\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = sendgrid.Client(api_key=\"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00382", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n SENDGRID_API_KEY: ${{ secrets.SENDGRID_API_KEY }}\n SENDGRID_FROM: ${{ secrets.SENDGRID_FROM }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00383", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n OPENAI_API_KEY: sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n OPENAI_ORG_ID: org-xxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00384", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: firebase-creds\nstringData:\n firebase_api_key: \"\"\n firebase_project_id: \"\"\n# Example format: AIzaSyXXXXXXXXXXXXXX...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00385", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_OPENAI_API_KEY = \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_OPENAI_ORG_ID = \"org-xxxxxxxxxxxx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.openai_key\", MOCK_OPENAI_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00386", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: stripe-creds\nstringData:\n stripe_secret_key: \"\"\n stripe_publishable_key: \"\"\n# Example format: sk_test_4eC39HqLyjWD...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00387", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n TWILIO_AUTH_TOKEN: your_auth_token_here\n TWILIO_ACCOUNT_SID: ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00388", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_TWILIO_AUTH_TOKEN = \"your_auth_token_here\"\nMOCK_TWILIO_ACCOUNT_SID = \"ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.twilio_key\", MOCK_TWILIO_AUTH_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00389", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate MongoDB Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `mongodb://user:...` (example)\n3. Update: `MONGO_URI=`\n4. Test, then revoke old key\n\nThe key `mongodb://user:...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00390", "source": "hard_negatives", "source_license": "generated", "text": "# Slack Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://slack.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nexport SLACK_SIGNING_SECRET=not-real\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = slack.Client(api_key=\"xoxb-not-a-real-token-placeholder\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00391", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nSLACK_SIGNING_SECRET=not-real\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00392", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Stripe?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"STRIPE_SECRET_KEY\", \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\n```\n\nDefault `sk_test_4eC39HqLyjWDarjtT1zdp7dc` is the **example key** \u2014 won't work.\nGet real key from https://stripe.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00393", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Twilio Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `your_auth_token...` (example)\n3. Update: `TWILIO_AUTH_TOKEN=`\n4. Test, then revoke old key\n\nThe key `your_auth_token...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00394", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Firebase Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AIzaSyXXXXXXXXX...` (example)\n3. Update: `FIREBASE_API_KEY=`\n4. Test, then revoke old key\n\nThe key `AIzaSyXXXXXXXXX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00395", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SLACK_BOT_TOKEN: xoxb-not-a-real-token-placeholder\n SLACK_SIGNING_SECRET: not-real\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00396", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00397", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: firebase-creds\nstringData:\n firebase_api_key: \"\"\n firebase_project_id: \"\"\n# Example format: AIzaSyXXXXXXXXXXXXXX...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00398", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Twilio Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `your_auth_token...` (example)\n3. Update: `TWILIO_AUTH_TOKEN=`\n4. Test, then revoke old key\n\nThe key `your_auth_token...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00399", "source": "hard_negatives", "source_license": "generated", "text": "# Slack Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://slack.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nexport SLACK_SIGNING_SECRET=not-real\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = slack.Client(api_key=\"xoxb-not-a-real-token-placeholder\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00400", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Firebase Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AIzaSyXXXXXXXXX...` (example)\n3. Update: `FIREBASE_API_KEY=`\n4. Test, then revoke old key\n\nThe key `AIzaSyXXXXXXXXX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00401", "source": "hard_negatives", "source_license": "generated", "text": "# Twilio Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://twilio.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport TWILIO_AUTH_TOKEN=your_auth_token_here\nexport TWILIO_ACCOUNT_SID=ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = twilio.Client(api_key=\"your_auth_token_here\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00402", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate MongoDB Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `mongodb://user:...` (example)\n3. Update: `MONGO_URI=`\n4. Test, then revoke old key\n\nThe key `mongodb://user:...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00403", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n TWILIO_AUTH_TOKEN: ${{ secrets.TWILIO_AUTH_TOKEN }}\n TWILIO_ACCOUNT_SID: ${{ secrets.TWILIO_ACCOUNT_SID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00404", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: github-creds\nstringData:\n github_token: \"\"\n github_app_id: \"\"\n# Example format: ghp_xxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00405", "source": "hard_negatives", "source_license": "generated", "text": "// OpenAI SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"org-xxxxxxxxxxxx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.OPENAI_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00406", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate AWS Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AKIAIOSFODNN7EX...` (example)\n3. Update: `AWS_ACCESS_KEY_ID=`\n4. Test, then revoke old key\n\nThe key `AKIAIOSFODNN7EX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00407", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: aws-creds\nstringData:\n aws_access_key_id: \"\"\n aws_secret_access_key: \"\"\n# Example format: AKIAIOSFODNN7EXAMPLE...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00408", "source": "hard_negatives", "source_license": "generated", "text": "// OpenAI SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"org-xxxxxxxxxxxx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.OPENAI_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00409", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"sendgrid\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00410", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_GITHUB_TOKEN = \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_GITHUB_APP_ID = \"12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.github_key\", MOCK_GITHUB_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00411", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nSENDGRID_FROM=noreply@example.com\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00412", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_SLACK_BOT_TOKEN = \"xoxb-not-a-real-token-placeholder\"\nMOCK_SLACK_SIGNING_SECRET = \"not-real\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.slack_key\", MOCK_SLACK_BOT_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00413", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate MongoDB Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `mongodb://user:...` (example)\n3. Update: `MONGO_URI=`\n4. Test, then revoke old key\n\nThe key `mongodb://user:...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00414", "source": "hard_negatives", "source_license": "generated", "text": "// SendGrid SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"noreply@example.com\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SENDGRID_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00415", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_STRIPE_SECRET_KEY = \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\"\nMOCK_STRIPE_PUBLISHABLE_KEY = \"pk_test_TYooMQauvdEDq54NiTphI7jx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.stripe_key\", MOCK_STRIPE_SECRET_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00416", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nFIREBASE_API_KEY=AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nFIREBASE_PROJECT_ID=my-project-12345\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00417", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"stripe\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00418", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nSLACK_SIGNING_SECRET=not-real\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00419", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n MONGO_URI: ${{ secrets.MONGO_URI }}\n MONGO_DB_NAME: ${{ secrets.MONGO_DB_NAME }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00420", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: slack-creds\nstringData:\n slack_bot_token: \"\"\n slack_signing_secret: \"\"\n# Example format: xoxb-not-a-real-toke...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00421", "source": "hard_negatives", "source_license": "generated", "text": "// SendGrid SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"noreply@example.com\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.SENDGRID_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00422", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure GitHub?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"GITHUB_TOKEN\", \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://github.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00423", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nTWILIO_AUTH_TOKEN=your_auth_token_here\nTWILIO_ACCOUNT_SID=ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00424", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n TWILIO_AUTH_TOKEN: your_auth_token_here\n TWILIO_ACCOUNT_SID: ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00425", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Stripe?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"STRIPE_SECRET_KEY\", \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\n```\n\nDefault `sk_test_4eC39HqLyjWDarjtT1zdp7dc` is the **example key** \u2014 won't work.\nGet real key from https://stripe.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00426", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"slack\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00427", "source": "hard_negatives", "source_license": "generated", "text": "# OpenAI Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://openai.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport OPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport OPENAI_ORG_ID=org-xxxxxxxxxxxx\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = openai.Client(api_key=\"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00428", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Slack?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SLACK_BOT_TOKEN\", \"xoxb-not-a-real-token-placeholder\")\n```\n\nDefault `xoxb-not-a-real-token-placeholder` is the **example key** \u2014 won't work.\nGet real key from https://slack.com/keys", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00429", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n STRIPE_SECRET_KEY: sk_test_4eC39HqLyjWDarjtT1zdp7dc\n STRIPE_PUBLISHABLE_KEY: pk_test_TYooMQauvdEDq54NiTphI7jx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00430", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"openai\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00431", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nSENDGRID_FROM=noreply@example.com\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00432", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_TWILIO_AUTH_TOKEN = \"your_auth_token_here\"\nMOCK_TWILIO_ACCOUNT_SID = \"ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.twilio_key\", MOCK_TWILIO_AUTH_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00433", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Stripe?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"STRIPE_SECRET_KEY\", \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\n```\n\nDefault `sk_test_4eC39HqLyjWDarjtT1zdp7dc` is the **example key** \u2014 won't work.\nGet real key from https://stripe.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00434", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Firebase Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AIzaSyXXXXXXXXX...` (example)\n3. Update: `FIREBASE_API_KEY=`\n4. Test, then revoke old key\n\nThe key `AIzaSyXXXXXXXXX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00435", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SENDGRID_API_KEY: SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\n SENDGRID_FROM: noreply@example.com\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00436", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00437", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n STRIPE_SECRET_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n STRIPE_PUBLISHABLE_KEY: ${{ secrets.STRIPE_PUBLISHABLE_KEY }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00438", "source": "hard_negatives", "source_license": "generated", "text": "# SendGrid Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://sendgrid.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nexport SENDGRID_FROM=noreply@example.com\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = sendgrid.Client(api_key=\"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00439", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SLACK_BOT_TOKEN: xoxb-not-a-real-token-placeholder\n SLACK_SIGNING_SECRET: not-real\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00440", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00441", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: github-creds\nstringData:\n github_token: \"\"\n github_app_id: \"\"\n# Example format: ghp_xxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00442", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}\n AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00443", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: openai-creds\nstringData:\n openai_api_key: \"\"\n openai_org_id: \"\"\n# Example format: sk-proj-xxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00444", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSTRIPE_SECRET_KEY=sk_test_4eC39HqLyjWDarjtT1zdp7dc\nSTRIPE_PUBLISHABLE_KEY=pk_test_TYooMQauvdEDq54NiTphI7jx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00445", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n TWILIO_AUTH_TOKEN: your_auth_token_here\n TWILIO_ACCOUNT_SID: ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00446", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_SENDGRID_API_KEY = \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_SENDGRID_FROM = \"noreply@example.com\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.sendgrid_key\", MOCK_SENDGRID_API_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00447", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate AWS Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `AKIAIOSFODNN7EX...` (example)\n3. Update: `AWS_ACCESS_KEY_ID=`\n4. Test, then revoke old key\n\nThe key `AKIAIOSFODNN7EX...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00448", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nOPENAI_API_KEY=sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nOPENAI_ORG_ID=org-xxxxxxxxxxxx\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00449", "source": "hard_negatives", "source_license": "generated", "text": "// OpenAI SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk-proj-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\", // Replace with your key\n secret: \"org-xxxxxxxxxxxx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.OPENAI_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00450", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_AWS_ACCESS_KEY_ID = \"AKIAIOSFODNN7EXAMPLE\"\nMOCK_AWS_SECRET_ACCESS_KEY = \"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.aws_key\", MOCK_AWS_ACCESS_KEY_ID):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00451", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n SENDGRID_API_KEY: SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\n SENDGRID_FROM: noreply@example.com\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00452", "source": "hard_negatives", "source_license": "generated", "text": "# SendGrid Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://sendgrid.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nexport SENDGRID_FROM=noreply@example.com\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = sendgrid.Client(api_key=\"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00453", "source": "hard_negatives", "source_license": "generated", "text": "# Slack Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://slack.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nexport SLACK_SIGNING_SECRET=not-real\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = slack.Client(api_key=\"xoxb-not-a-real-token-placeholder\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00454", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nFIREBASE_API_KEY=AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nFIREBASE_PROJECT_ID=my-project-12345\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00455", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Stripe?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"STRIPE_SECRET_KEY\", \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\n```\n\nDefault `sk_test_4eC39HqLyjWDarjtT1zdp7dc` is the **example key** \u2014 won't work.\nGet real key from https://stripe.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00456", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nSENDGRID_FROM=noreply@example.com\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00457", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Stripe?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"STRIPE_SECRET_KEY\", \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\n```\n\nDefault `sk_test_4eC39HqLyjWDarjtT1zdp7dc` is the **example key** \u2014 won't work.\nGet real key from https://stripe.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00458", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: github-creds\nstringData:\n github_token: \"\"\n github_app_id: \"\"\n# Example format: ghp_xxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00459", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Anthropic Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk-ant-xxxxxxxx...` (example)\n3. Update: `ANTHROPIC_API_KEY=`\n4. Test, then revoke old key\n\nThe key `sk-ant-xxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00460", "source": "hard_negatives", "source_license": "generated", "text": "# AWS Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://aws.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE\nexport AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = aws.Client(api_key=\"AKIAIOSFODNN7EXAMPLE\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00461", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"firebase\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00462", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure Stripe?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"STRIPE_SECRET_KEY\", \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\")\n```\n\nDefault `sk_test_4eC39HqLyjWDarjtT1zdp7dc` is the **example key** \u2014 won't work.\nGet real key from https://stripe.com/keys", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00463", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00464", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: sendgrid-creds\nstringData:\n sendgrid_api_key: \"\"\n sendgrid_from: \"\"\n# Example format: SG.xxxxxxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00465", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_STRIPE_SECRET_KEY = \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\"\nMOCK_STRIPE_PUBLISHABLE_KEY = \"pk_test_TYooMQauvdEDq54NiTphI7jx\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.stripe_key\", MOCK_STRIPE_SECRET_KEY):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00466", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: twilio-creds\nstringData:\n twilio_auth_token: \"\"\n twilio_account_sid: \"\"\n# Example format: your_auth_token_here...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00467", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"sendgrid\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00468", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Anthropic Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk-ant-xxxxxxxx...` (example)\n3. Update: `ANTHROPIC_API_KEY=`\n4. Test, then revoke old key\n\nThe key `sk-ant-xxxxxxxx...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00469", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: anthropic-creds\nstringData:\n anthropic_api_key: \"\"\n anthropic_model: \"\"\n# Example format: sk-ant-xxxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00470", "source": "hard_negatives", "source_license": "generated", "text": "// Stripe SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\", // Replace with your key\n secret: \"pk_test_TYooMQauvdEDq54NiTphI7jx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.STRIPE_SECRET_KEY", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00471", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n ANTHROPIC_API_KEY: sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n ANTHROPIC_MODEL: default\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00472", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00473", "source": "hard_negatives", "source_license": "generated", "text": "# Stack Overflow Answer\n# Q: How to configure SendGrid?\n# A (Score: 142):\n\n```python\nimport os\napi_key = os.environ.get(\"SENDGRID_API_KEY\", \"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\n```\n\nDefault `SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx` is the **example key** \u2014 won't work.\nGet real key from https://sendgrid.com/keys", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00474", "source": "hard_negatives", "source_license": "generated", "text": "// Firebase SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\", // Replace with your key\n secret: \"my-project-12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.FIREBASE_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00475", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n FIREBASE_API_KEY: ${{ secrets.FIREBASE_API_KEY }}\n FIREBASE_PROJECT_ID: ${{ secrets.FIREBASE_PROJECT_ID }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00476", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n SLACK_BOT_TOKEN: ${{ secrets.SLACK_BOT_TOKEN }}\n SLACK_SIGNING_SECRET: ${{ secrets.SLACK_SIGNING_SECRET }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00477", "source": "hard_negatives", "source_license": "generated", "text": "// MongoDB SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"mongodb://user:password@localhost:27017/testdb\", // Replace with your key\n secret: \"testdb\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.MONGO_URI", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00478", "source": "hard_negatives", "source_license": "generated", "text": "// Stripe SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"sk_test_4eC39HqLyjWDarjtT1zdp7dc\", // Replace with your key\n secret: \"pk_test_TYooMQauvdEDq54NiTphI7jx\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.STRIPE_SECRET_KEY", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00479", "source": "hard_negatives", "source_license": "generated", "text": "# CI/CD Pipeline \u2014 uses secret references\nname: Deploy\non: [push]\njobs:\n deploy:\n runs-on: ubuntu-latest\n env:\n STRIPE_SECRET_KEY: ${{ secrets.STRIPE_SECRET_KEY }}\n STRIPE_PUBLISHABLE_KEY: ${{ secrets.STRIPE_PUBLISHABLE_KEY }}\n steps:\n - uses: actions/checkout@v4\n - run: ./deploy.sh\n\n# No actual secrets in this file \u2014 only references.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00480", "source": "hard_negatives", "source_license": "generated", "text": "# Anthropic Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://anthropic.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport ANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport ANTHROPIC_MODEL=default\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = anthropic.Client(api_key=\"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00481", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nANTHROPIC_MODEL=default\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00482", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"stripe\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00483", "source": "hard_negatives", "source_license": "generated", "text": "# Firebase Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://firebase.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport FIREBASE_API_KEY=AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nexport FIREBASE_PROJECT_ID=my-project-12345\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = firebase.Client(api_key=\"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00484", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Twilio Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `your_auth_token...` (example)\n3. Update: `TWILIO_AUTH_TOKEN=`\n4. Test, then revoke old key\n\nThe key `your_auth_token...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00485", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: stripe-creds\nstringData:\n stripe_secret_key: \"\"\n stripe_publishable_key: \"\"\n# Example format: sk_test_4eC39HqLyjWD...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00486", "source": "hard_negatives", "source_license": "generated", "text": "# Unit Test Configuration\n# Fake credentials for testing only\n\nimport pytest\nfrom unittest.mock import patch\n\nMOCK_GITHUB_TOKEN = \"ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\"\nMOCK_GITHUB_APP_ID = \"12345\"\n\n@pytest.fixture\ndef mock_client():\n with patch(\"app.github_key\", MOCK_GITHUB_TOKEN):\n yield\n\ndef test_auth(mock_client):\n assert True # Test with mock credentials", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00487", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n MONGO_URI: mongodb://user:password@localhost:27017/testdb\n MONGO_DB_NAME: testdb\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "MongoDB tutorial/example with placeholder credentials ('mongodb://user:passw...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00488", "source": "hard_negatives", "source_license": "generated", "text": "# .env.example \u2014 copy to .env and fill in real values\nSENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nSENDGRID_FROM=noreply@example.com\nAPP_ENV=development\nDEBUG=true\n\n# ALL values above are PLACEHOLDERS.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00489", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Stripe Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `sk_test_4eC39Hq...` (example)\n3. Update: `STRIPE_SECRET_KEY=`\n4. Test, then revoke old key\n\nThe key `sk_test_4eC39Hq...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Stripe tutorial/example with placeholder credentials ('sk_test_4eC39HqLyjWD...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00490", "source": "hard_negatives", "source_license": "generated", "text": "# Terraform Example\nprovider \"github\" {\n api_key = \"\" # Replace\n secret_key = \"\" # Replace\n region = \"us-east-1\"\n}\n\n# Placeholder values from Terraform docs.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "GitHub tutorial/example with placeholder credentials ('ghp_xxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00491", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: twilio-creds\nstringData:\n twilio_auth_token: \"\"\n twilio_account_sid: \"\"\n# Example format: your_auth_token_here...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Twilio tutorial/example with placeholder credentials ('your_auth_token_here...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00492", "source": "hard_negatives", "source_license": "generated", "text": "# Anthropic Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://anthropic.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport ANTHROPIC_API_KEY=sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\nexport ANTHROPIC_MODEL=default\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = anthropic.Client(api_key=\"sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00493", "source": "hard_negatives", "source_license": "generated", "text": "# Slack Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://slack.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SLACK_BOT_TOKEN=xoxb-not-a-real-token-placeholder\nexport SLACK_SIGNING_SECRET=not-real\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = slack.Client(api_key=\"xoxb-not-a-real-token-placeholder\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00494", "source": "hard_negatives", "source_license": "generated", "text": "## How to Rotate Slack Keys\n\n1. Generate a new key in dashboard\n2. Old key format: `xoxb-not-a-real...` (example)\n3. Update: `SLACK_BOT_TOKEN=`\n4. Test, then revoke old key\n\nThe key `xoxb-not-a-real...` is from docs \u2014 not real.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Slack tutorial/example with placeholder credentials ('xoxb-not-a-real-toke...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00495", "source": "hard_negatives", "source_license": "generated", "text": "# SendGrid Quick Start Guide\n\n## Step 1: Get your API key\nVisit https://sendgrid.com/settings/api-keys\n\n## Step 2: Configure\n```bash\nexport SENDGRID_API_KEY=SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\nexport SENDGRID_FROM=noreply@example.com\n```\n\n> **Note**: The values above are **placeholder examples** from the documentation.\n> Replace them with your actual credentials.\n\n## Step 3: Test\n```python\nclient = sendgrid.Client(api_key=\"SG.xxxxxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx\")\nprint(client.verify())\n```\n\nThese example keys will NOT work \u2014 they are for illustration only.", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "SendGrid tutorial/example with placeholder credentials ('SG.xxxxxxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00496", "source": "hard_negatives", "source_license": "generated", "text": "# Kubernetes Secret Template\napiVersion: v1\nkind: Secret\nmetadata:\n name: openai-creds\nstringData:\n openai_api_key: \"\"\n openai_org_id: \"\"\n# Example format: sk-proj-xxxxxxxxxxxx...", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "OpenAI tutorial/example with placeholder credentials ('sk-proj-xxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00497", "source": "hard_negatives", "source_license": "generated", "text": "// Firebase SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AIzaSyXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\", // Replace with your key\n secret: \"my-project-12345\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.FIREBASE_API_KEY", "findings": [{"category": "safe", "subcategory": "safe.documentation", "severity": "info", "explanation": "Firebase tutorial/example with placeholder credentials ('AIzaSyXXXXXXXXXXXXXX...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00498", "source": "hard_negatives", "source_license": "generated", "text": "// AWS SDK Example \u2014 official documentation\n// These are EXAMPLE credentials.\n\nconst config = {\n apiKey: \"AKIAIOSFODNN7EXAMPLE\", // Replace with your key\n secret: \"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\", // Replace with your secret\n environment: \"sandbox\",\n};\n\n// NEVER hardcode production credentials.\n// Use environment variables: process.env.AWS_ACCESS_KEY_ID", "findings": [{"category": "safe", "subcategory": "safe.config", "severity": "info", "explanation": "AWS tutorial/example with placeholder credentials ('AKIAIOSFODNN7EXAMPLE...'). Not real \u2014 documentation examples only."}]} {"id": "hard_safe_tutorial_credentials_00499", "source": "hard_negatives", "source_license": "generated", "text": "# Docker Compose \u2014 Local Development\n# Default credentials for local dev only\n\nversion: '3.8'\nservices:\n app:\n build: .\n environment:\n ANTHROPIC_API_KEY: sk-ant-xxxxxxxxxxxxxxxxxxxxxxxxxxxx\n ANTHROPIC_MODEL: default\n NODE_ENV: development\n\n# WARNING: These are development defaults.\n# Replace before deploying to production.", "findings": [{"category": "safe", "subcategory": "safe.code", "severity": "info", "explanation": "Anthropic tutorial/example with placeholder credentials ('sk-ant-xxxxxxxxxxxxx...'). Not real \u2014 documentation examples only."}]}