Secret scanning with Gitleaks identifies hard‑coded credentials before commits, addressing a common attack vector. The demo repo contains such secrets. Following that, SAST via Bandit examines the same code for non‑secret flaws like SQL injection, eval usage, and debug mode.
Comments