Hardcoding credentials in code is never a good idea. If your source code falls into the hands of a malicious entity (and it happens more often than we’d like to acknowledge), they can use secrets from the source code to gain access to systems.
.deepsource.toml
configuration specific to the secrets
analyzer. Please make sure to read the general configuration guide first.
name
enabled