Exposed credentials - How attackers find and exploit secrets in source code