Review the method used to document the secrets detected by secret detection

Problem to solve

The secrets detected by pipeline secret detection and secret push protection are documented on the following pages:

The tables on these pages were created by extracting content from the source TOML-formatted files into CSV-formatted files, then "converted" into a Markdown table format by applying a series of CLI commands. The series of commands is documented at !155669 (comment 1942039299).

The CLI commands are effective, but take some time and require use of several CLI utilities.

TOML source files:

Proposal

Determine if there is a more efficient and effective method of creating these tables.

Who can address the issue

Anyone.

Other links/references

Edited by Russell Dickenson