Requests the addition of dedicated detection rules for leaked Looker SDK credentials, specifically API3 `client_id` and `client_secret`, which are often found in `looker.ini` or hardcoded.
**Describe the solution you'd like** There is currently no dedicated detection for leaked Looker SDK credentials, particularly API3 client_id and client_secret, which are frequently stored in INI-based configuration (looker.ini) or hardcoded in application code and scripts. A draft PR implementing rules for Looker client_id and client_secret has been prepared and will be linked to this issue. **Additional context** Relevant references here: - https://github.com/looker-open-source/sdk-codegen#environment-variable-configuration - https://cloud.google.com/looker/docs/api-sdk cc @zricethezav