Always assume your git repo is compromised. This is not far-fetched, as a git repo lives on every developer desktop and laptop. So, should a device be stolen, the thieving party has a full copy of your control repo… Including all your passwords, hostnames, service endpoints etc. This is a very bad position to find…