API Keys and Secrets Hardcoded in Source Code
Claude Code generated code with API keys, database passwords, or other secrets hardcoded directly in source files. These credentials are now committed to your Git repository and visible to anyone with access to the code.
This is one of the most common security mistakes in AI-assisted development. The AI often places real credentials inline to make the code immediately functional, without considering that the code will be version-controlled and potentially shared.
You may discover this when GitHub sends a secret scanning alert, when a third-party service notifies you of leaked credentials, or when you notice unexpected charges on your cloud account.
Error Messages You Might See
Common Causes
- Credentials pasted into prompts — You shared API keys in your prompt and Claude Code embedded them directly in the generated files
- No .env file pattern — The generated project doesn't use environment variables or a .env file for configuration
- Missing .gitignore — Even if a .env file exists, it's not listed in .gitignore and gets committed
- Config files with real values — Application config files (config.json, settings.py) contain production credentials as defaults
- Test files with real keys — Integration tests or seed scripts use actual API keys instead of test/mock credentials
How to Fix It
- Search your entire codebase — Use tools like trufflehog, gitleaks, or grep for patterns like 'sk-', 'AKIA', 'ghp_', or 'password=' across all files and Git history
- Move all secrets to environment variables — Replace hardcoded values with process.env.KEY_NAME or os.environ['KEY_NAME'] and create a .env.example with placeholder values
- Rotate every exposed credential immediately — Generate new keys for every service whose credentials were committed, even if the repo is private
- Scrub Git history — Use git filter-branch or BFG Repo Cleaner to remove secrets from past commits
- Add pre-commit hooks — Install detect-secrets or gitleaks as a pre-commit hook to prevent future leaks
Real developers can help you.
You don't need to be technical. Just describe what's wrong and a verified developer will handle the rest.
Get HelpFrequently Asked Questions
Are my API keys compromised if they were in a private repo?
Treat them as compromised. Private repos can be forked, cloned by team members, or exposed through CI logs. Always rotate keys that were ever committed to any repository.
How do I remove secrets from Git history?
Use BFG Repo Cleaner or git filter-repo to rewrite history. After cleaning, force-push and have all collaborators re-clone. The old commits may still exist in forks or cached copies.