The software we build often depends on sensitive data that must be kept secure at all costs. This data, which includes database passwords, authentication credentials and sensitive configuration, is commonly referred to as secrets. Leakage of secrets may expose the organization to compromise or attacks. Therefore, developers and system administrators…