Problem Statement
How should a pipeline handle secrets like API keys or tokens?
Explanation
Never hard code secrets in scripts or in the repo. Store them in a secret manager or the CI vault and inject at runtime only.
Scope access with least privilege and rotate keys regularly to reduce blast radius.
Code Solution
SolutionRead Only
env:
DB_PASSWORD: ${{ secrets.DB_PASSWORD }}