Do not host authentication tokens in any publicly-accessible locations (such as public source code repositories).
Doing so presents a security risk.
Do not host authentication tokens in any publicly-accessible locations (such as public source code repositories).
Doing so presents a security risk.