Attackers constantly scan public search results to map your infrastructure...
https://linuxsecurity.com/news/security-trends/search-exposure-linux-security
Attackers constantly scan public search results to map your infrastructure before they strike. If your SSH configs, private keys, or internal API tokens live on GitHub or exposed web directories, you hand bad actors a roadmap to your network