T-Mobile stated that they don't believe that any sensitive data was stolen. The moment your source code leaks and it has secrets in it, this is a game over!
The problem is not only with the fact that secrets need to be rotated, but the operational impact it can cause if not rotated in all places. Add the time aspect to it and you have a goodie bag.