logoalt Hacker News

QuadrupleAyesterday at 9:51 PM4 repliesview on HN

Fun fact: Copilot gives you no way to ignore sensitive files with API keys, passwords, DB credentials, etc.: https://github.com/orgs/community/discussions/11254#discussi...

So by default you send all this to Microsoft by opening your IDE.


Replies

0xbadcafebeeyesterday at 11:32 PM

Separate fun fact: Gemini CLI blocks env vars with strings like 'AUTH' in the name. They have two separate configuration options that both let you allow specific env vars. Neither work (bad vibe coding). Tried opening an issue and a PR, and two separate vibe-coding bots picked up my issue and wrote PRs, but nobody has looked at them. Bug's still there, so can't do git code signing via ssh agent socket. Only choice is to do the less-secure, not-signed git commits.

On top of that, Gemini 3 refuses to refactor open source code, even if you fork it, if Gemini thinks your changes would violate the spirit of the intent of the original developers in a safety/security context. Even if you think you're actually making it more secure, but Gemini doesn't, it won't write your code.

sceptic123today at 8:52 AM

Fun fact: you shouldn't have sensitive files with API keys, passwords, DB credentials, etc. in your repo

show 1 reply
nulld3vtoday at 12:01 AM

Sadly, this issue is systemic: https://github.com/openai/codex/issues/2847

show 1 reply
malnourishyesterday at 11:18 PM

I swear I just set up enterprise and org level ignore paths.

show 1 reply