-
McConahy, Renee Margaret authored
I see little risk in using known passwords here, but it's such a bad practice that I'd rather avoid it entirely. (The worst case I can imagine is that a malicious process running on the developer's workstation would be able to manipulate the configuration.)
McConahy, Renee Margaret authoredI see little risk in using known passwords here, but it's such a bad practice that I'd rather avoid it entirely. (The worst case I can imagine is that a malicious process running on the developer's workstation would be able to manipulate the configuration.)
Code owners
Assign users and groups as approvers for specific file changes. Learn more.