Search engines index everything from exposed SSH keys to internal configuration...
https://linuxsecurity.com/news/security-trends/search-exposure-linux-security
Search engines index everything from exposed SSH keys to internal configuration files you accidentally pushed to GitHub. When you leave your infrastructure footprints online, you hand attackers a map for credential stuffing attacks