Skip to content

Commit 7e8a65b

Browse files
committed
small change
1 parent 6470cab commit 7e8a65b

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/defender-for-cloud/detect-exposed-secrets.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -109,15 +109,15 @@ Credentials that are used for test resources and environments shouldn't be suppr
109109
To suppress a secret that is found on the same line, add the following code as a comment at the end of the line that has the secret:
110110
111111
```bash
112-
[SuppressMessage("Microsoft.Security", "CS001:SecretInLine", Justification="... .")]
112+
#[SuppressMessage("Microsoft.Security", "CS001:SecretInLine", Justification="... .")]
113113
```
114114

115115
### Suppress a secret in the next line
116116

117117
To suppress the secret found in the next line, add the following code as a comment before the line that has the secret:
118118

119119
```bash
120-
[SuppressMessage("Microsoft.Security", "CS002:SecretInNextLine", Justification="... .")]
120+
#[SuppressMessage("Microsoft.Security", "CS002:SecretInNextLine", Justification="... .")]
121121
```
122122

123123
## Supported file types and exit codes

0 commit comments

Comments
 (0)