Attackers scan the public web like a directory to find your infrastructure....
https://linuxsecurity.com/news/security-trends/search-exposure-linux-security
Attackers scan the public web like a directory to find your infrastructure. When your SSH configurations or private repository keys leak into search indices or GitHub, you hand hackers a roadmap for credential stuffing attacks