Do not commit secrets to this repository.
Forbidden in git history:
- API tokens
- SSH private keys
- cloud credentials
- session cookies/passwords
Use system secret stores instead:
- macOS Keychain
- 1Password / 1Password CLI
- Keep machine-local secret config out of tracked files.
- Use ignored local override files where needed (
config/zsh/local.zshpattern). - Prefer environment injection at runtime over static plaintext files.
If sensitive data is accidentally committed:
- Revoke/rotate exposed credentials immediately.
- Remove data from working tree and history as needed.
- Open a security issue/notification to maintainers with impact details.
- Avoid adding scripts that exfiltrate environment variables or keychain values.
- Avoid broad network calls in bootstrap logic outside documented dependencies.