GitHub and secrets safety
Publish code without leaking API keys, tokens, or environment files.
Goal
Publish code without leaking API keys, tokens, or environment files.
Before you start
- A GitHub account or time to create one
- A project you are ready to inspect
GitHub is where your code lives. That makes it useful, but also public if you choose a public repository. This lesson is about publishing without leaking private information.
Create a GitHub account
GitHub's official docs say you need a personal account and a verified email address to get started.
Go to GitHub and sign up: github.com
Official guide: Creating an account on GitHub
The secret rule
Never commit secrets. Secrets include:
- API keys.
- Telegram bot tokens.
- Passwords.
.envfiles.- Private URLs that contain tokens.
Check before committing
Always run:
git status
This shows what Git is about to track.
If you see .env, .env.local, or anything that looks private, stop.
Use .gitignore
Your project should include a .gitignore file. It tells Git which files to ignore.
Make sure environment files are ignored:
.env
.env.local
.env.*
If you leak a secret
Deleting the file later is not enough. Git history may still contain it.
Do this instead:
- Revoke or rotate the exposed key in the provider dashboard.
- Remove the secret from the project.
- Ask for help before pushing again.
Publishing checklist
- I ran
git status. - I checked that no
.envfiles are staged. - I checked that no API keys appear in code.
- I understand whether my repository is public or private.
- I know how to rotate a key if I accidentally expose it.
Official references
Lesson checklist
Tick these as you verify them. Signed-in students sync to the workshop dashboard; everyone else keeps progress in this browser.
Local progress
Save this lesson on this device.
No account needed yet. This only stores the lesson slug in your browser, not commands, secrets, or project files.