Sensitive Data Exposure – Sentry Auth Token
Depending on the leaked secret, an attacker can perform one of the following types of attacks successfully:
It is recommended to revoke leaked secrets. Investigate and resolve the source of the leak. Hard-coded Secrets can be accidentally released to the public. Don't store these secrets on the application tree. Find the source of the leak and make sure it's disabled.