Where applicable, we aim to generate reproducible code that is made open source. This is in line with guidance outlined in the government service manual.
You must check the repository does not compromise data security before making it public.
Git commit history
Your git commit history will be made public.
- Git messages can be changed but it is advised that you follow good commit practice.
- Each commit should be limited to a single change.
- Commit history can be removed but it is not recommended as we strive to be transparent.
Never expose Personally Identifiable Information (PII) on GitHub
Make sure that you never push Personally Identifiable Information (PII) to the GitHub repository.
- Use Gitleaks to reduce the risk of pushing PII to Git.
- Never write PII directly in R scripts.
- Always reference PII from the database.