Skip to content

Comments

Enhance .gitignore for sensitive data and private key protection#26

Draft
Copilot wants to merge 3 commits intomasterfrom
copilot/add-gitignore-for-secrets
Draft

Enhance .gitignore for sensitive data and private key protection#26
Copilot wants to merge 3 commits intomasterfrom
copilot/add-gitignore-for-secrets

Conversation

Copy link

Copilot AI commented Feb 10, 2026

Expands .gitignore patterns to prevent accidental commits of sensitive credentials, private keys, and blockchain wallet data.

Key Additions

Environment & Configuration

  • All .env variations (.env.local, .env.*.local, .env.development.local, etc.)
  • Local config overrides (**/config.local.*)

Cryptographic Material

  • SSL/TLS certificates: *.crt, *.cer, *.csr, *.der
  • Private keys: *.ppk, *.jks, *.keystore

Credentials & Secrets

  • API keys: api-keys.json, *.secrets.json
  • Service accounts: service-account*.json
  • Cloud providers: .aws/config, .gcp/credentials, .azure/credentials, gcloud-service-key.json

Blockchain/Web3 (critical for this repo)

  • Wallet files: keystore/, wallet.json, wallet.dat, *.wallet
  • Seed material: mnemonic.txt, seed.txt, private-key.txt

Database & Backups

  • Dumps: *.sql, *.sqlite, *.dump, *.backup

Organization

  • Categorized into logical sections with comments
  • Fixed formatting (removed tab before *.id_ed25519)
  • Corrected Windows thumbnail pattern (ehthumbs_vista.db)
  • Removed redundant generic *.log pattern in favor of specific patterns
Original prompt

Add.gitignore to hide sensitive data and private keys


💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.

Copilot AI and others added 2 commits February 10, 2026 13:46
… private keys

Co-authored-by: Kushmanmb <193178375+Kushmanmb@users.noreply.github.com>
…n and fix Windows thumbnail file name

Co-authored-by: Kushmanmb <193178375+Kushmanmb@users.noreply.github.com>
Copilot AI changed the title [WIP] Add .gitignore to hide sensitive data and private keys Enhance .gitignore for sensitive data and private key protection Feb 10, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants