The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Additionally the GIT credentials are present and could give unauthorized access to source code repository of private projects.
Severity: critical
Fingerprint: 2580fa947178c883cda65107b6f0882eff0fd891a035f5a11d87464a4cdf7129
[fetch] recurseSubmodules = false [http "https://gitlab.com"] sslCAInfo = /Users/codesman/Code/Repos/gitlab.com/atomic-dev/builds/c88d6316/0/atomic-dev/atomicappworks.com.tmp/CI_SERVER_TLS_CA_FILE [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true ignorecase = true precomposeunicode = true [remote "origin"] url = https://gitlab-ci-token:_cAXU3DVfW7Fiemiw6U8@gitlab.com/atomic-dev/atomicappworks.com.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master