How To Identify Hard Coded Secrets In Software