Hackers don't break in when they can just log in. When your SSH configurations...
https://iris-wiki.win/index.php/The_Invisible_Thread:_Why_Username_Reuse_is_Your_Biggest_Recon_Liability
Hackers don't break in when they can just log in. When your SSH configurations or private repository links leak onto search engines, you hand attackers a map of your infrastructure