Context
A recent cleanup identified that local development artifacts (e.g. symlinks and temporary files) can be unintentionally included in the repository. While no sensitive data was exposed, we should enforce safeguards to prevent this class of issue entirely.
Objective
Ensure that local, temporary, and potentially sensitive files are never committed to the repository.
Actions
1. Update .gitignore
Add and enforce ignore rules for:
tmp/
*.b64
.zhtp/
keystore*
*.key
*.pem
.env
2. Pre-commit hook (required)
Implement a pre-commit hook that blocks commits containing:
-
symlinks
-
files inside tmp/
-
files matching:
Example checks:
- detect symlinks in staged files
- pattern match against restricted paths and extensions
3. Repository scan (one-time)
Run a full scan of the repository (including history if needed) to confirm:
- no keystore references
- no encoded artifacts (
*.b64)
- no local environment folders
4. CI safeguard (recommended)
Add a CI step that fails builds if restricted patterns are detected in commits or PRs.
5. Developer guidelines
Document and communicate:
- no local paths or environment-specific artifacts in commits
- no encoded files unless explicitly required and reviewed
- use environment variables or secure storage for any sensitive material
Acceptance Criteria
.gitignore updated and enforced
- pre-commit hook active and tested
- CI check in place (if implemented)
- repository verified clean
- team informed of new guidelines
Notes
This is a preventive measure to enforce repository hygiene and avoid non-functional artifacts entering version control.
Context
A recent cleanup identified that local development artifacts (e.g. symlinks and temporary files) can be unintentionally included in the repository. While no sensitive data was exposed, we should enforce safeguards to prevent this class of issue entirely.
Objective
Ensure that local, temporary, and potentially sensitive files are never committed to the repository.
Actions
1. Update
.gitignoreAdd and enforce ignore rules for:
2. Pre-commit hook (required)
Implement a pre-commit hook that blocks commits containing:
symlinks
files inside
tmp/files matching:
*.b64keystore*.zhtp/*Example checks:
3. Repository scan (one-time)
Run a full scan of the repository (including history if needed) to confirm:
*.b64)4. CI safeguard (recommended)
Add a CI step that fails builds if restricted patterns are detected in commits or PRs.
5. Developer guidelines
Document and communicate:
Acceptance Criteria
.gitignoreupdated and enforcedNotes
This is a preventive measure to enforce repository hygiene and avoid non-functional artifacts entering version control.