Hard-coding credentials in source code or binaries makes it easy for attackers to extract sensitive information, especially in distributed or
open-source applications. This practice exposes your application to significant security risks.
This rule flags instances of hard-coded credentials used in database and LDAP connections. It looks for hard-coded credentials in connection
strings, and for variable names that match any of the patterns from the provided list.