This project contains sensitive API keys and credentials that must NEVER be committed to Git.
client_secret_*.json- Google OAuth client secrets*-project-*.json- Google service account keys*.pem,*.key,*.crt- SSL certificates and private keys.env- Environment variables with actual API keystest_*.js- Test files that may contain sensitive datadebug_*.js- Debug files with potential sensitive informationsetup_*.js- Setup files with credentials
Create a .env file in the project root with:
# Calendly API
CALENDLY_TOKEN=your_actual_calendly_token
# Google Calendar API
GOOGLE_CLIENT_ID=your_actual_client_id
GOOGLE_CLIENT_SECRET=your_actual_client_secret
GOOGLE_REDIRECT_URI=your_actual_redirect_uri
# EmailJS (if using)
EMAILJS_PUBLIC_KEY=your_actual_public_key
EMAILJS_PRIVATE_KEY=your_actual_private_key
# Server Configuration
PORT=3001
NODE_ENV=development- Verify .gitignore is updated - Check that all sensitive files are excluded
- Check git status - Ensure no sensitive files are staged
- Review staged changes - Double-check what will be committed
- Test locally - Ensure the app works with environment variables
# Check what files are staged
git status
# Check what will be committed
git diff --cached
# Remove any accidentally staged sensitive files
git reset HEAD client_secret_*.json
git reset HEAD *-project-*.json
git reset HEAD .env- Immediately revoke the exposed credentials
- Generate new API keys
- Update your .env file
- Force push to remove the sensitive data from history (if it was the last commit)
- Contact your team about the security breach
- Use environment variables for all sensitive configuration
- Never hardcode API keys in source code
- Regularly rotate API keys and credentials
- Use different credentials for development and production
- Consider using a secrets management service for production
If you're unsure about any file's sensitivity, ask before committing!