Skip to content

Update LLM content#1

Open
ankitdas13 wants to merge 1 commit intomasterfrom
markdown-docs
Open

Update LLM content#1
ankitdas13 wants to merge 1 commit intomasterfrom
markdown-docs

Conversation

@ankitdas13
Copy link
Copy Markdown
Contributor

No description provided.

@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 1, 2026

🔐 Security Pipeline Status

Repository Security Check

If this repository is blocked by security issues, please visit the Pipeline Blocking Dashboard to see which issues need to be resolved:

📊 Pipeline Blocking Dashboard

The dashboard contains detailed information about:

  • Current blocking Security vulnerabilitie issues

Report generated on: 2026-04-01 14:41:51 IST
Repository: markdown-docs

Note: This comment will show SLAs of open security issues once SBB migration to DevRev is complete.

> **Watch Out!**
>
> - The minimum supported iOS version for using Turbo UPI is currently 12.0.
> - Use the `rzp_test_8UzRYt0d70Ntgz` API key id for testing on the UAT environment and the [Razorpay live keys](https://raw.githubusercontent.com/razorpay/razorpay-php-testapp/markdown-docs/llm-content/api/authentication.md#live-mode-api-keys) for prod testing.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Invalid secret detected

The secret identified in your code has been confirmed as invalid, indicating it has likely been revoked or is merely an example. While it may not pose an immediate risk, we recommend reviewing to ensure no actual sensitive data is leaked.

A secret is hard-coded in the application. Secrets stored in source code, such as credentials, identifiers, and other types of sensitive data, can be leaked and used by internal or external malicious actors. It is recommended to rotate the secret and retrieve them from a secure secret vault or Hardware Security Module (HSM), alternatively environment variables can be used if allowed by your company policy.

⚪️ This finding does not block your pull request.
Ignore this finding from razorpay-test-api-token

>
> - `minSDKversion` for using Turbo UPI is currently for Android is 23 and iOS is 12.0 and cannot be overwritten.
> - API Key Usage for Different Environments:
> - Use the `rzp_test_8UzRYt0d70Ntgz` API key id for testing on the UAT environment.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Invalid secret detected

The secret identified in your code has been confirmed as invalid, indicating it has likely been revoked or is merely an example. While it may not pose an immediate risk, we recommend reviewing to ensure no actual sensitive data is leaked.

A secret is hard-coded in the application. Secrets stored in source code, such as credentials, identifiers, and other types of sensitive data, can be leaked and used by internal or external malicious actors. It is recommended to rotate the secret and retrieve them from a secure secret vault or Hardware Security Module (HSM), alternatively environment variables can be used if allowed by your company policy.

⚪️ This finding does not block your pull request.
Ignore this finding from razorpay-test-api-token

>
> - `minSDKversion` for using Turbo UPI is currently 19 and cannot be overwritten.
> - API Key Usage for Different Environments:
> - Use the `rzp_test_0wFRWIZnH65uny` API key id for testing on the UAT environment.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Invalid secret detected

The secret identified in your code has been confirmed as invalid, indicating it has likely been revoked or is merely an example. While it may not pose an immediate risk, we recommend reviewing to ensure no actual sensitive data is leaked.

A secret is hard-coded in the application. Secrets stored in source code, such as credentials, identifiers, and other types of sensitive data, can be leaked and used by internal or external malicious actors. It is recommended to rotate the secret and retrieve them from a secure secret vault or Hardware Security Module (HSM), alternatively environment variables can be used if allowed by your company policy.

⚪️ This finding does not block your pull request.
Ignore this finding from razorpay-test-api-token

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant