OIDC secrets are used by clients to prove their identity to the authorization server. If exposed in code repositories, CI/CD logs, build artifacts, or container images, they can be exploited to generate tokens, impersonate users, or gain extended access to APIs. This is not a hypothetical—it is a