Where secrets usually hide
Secrets are not limited to one obvious line. They can appear in environment files, inline config blocks, hardcoded samples, deployment notes, copied cURL commands, request headers, and provider-specific examples inside application code.
What to strip first
Review anything named apiKey, token, secret, clientSecret, password, authorization, and any account-specific keys from cloud, payment, analytics, or support vendors.
Why this improves debugging too
Clean examples are easier to reason about. Once secrets and tenant-specific values are removed, the AI can focus on code structure, flow, and error handling instead of noisy credentials that should never have been shared in the first place.