Initially I'm thinking we should look for these values: ```password pass pw pwd passwd key user username secret ``` Once we have analyzed a number of files we can go back and see which terms are actually finding vulnerabilities.
Initially I'm thinking we should look for these values:
Once we have analyzed a number of files we can go back and see which terms are actually finding vulnerabilities.