The bad practices performed during the configuration of CI/CD pipelines, and bad practices performed in the process, can be detected from two sources: configuration files and logs.