Or, “How I integrated python-secrets with Splunk’s Attack Range framework, and how you can do the same for your open source project!” — In this article, I want to do three things. (1) point out a couple of what I consider to be pervasive fundamental computer security problems, (2) provide my own proposed solution to them, and (3) show you how you can implement that solution in your own open source project (or…