GitHub secret scanning alert generated
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Goal
Detect when a GitHub scan detects a secret stored in a repository.
Strategy
Secret scanning is a security feature that helps detect and prevent the accidental inclusion of sensitive information such as API keys, passwords, tokens, and other secrets in your repository. When enabled, secret scanning scans commits in repositories for known types of secrets and alerts repository administrators upon detection.
Secret scanning scans your entire Git history on all branches present in your GitHub repository for secrets. GitHub will also periodically run a full Git history scan of existing content in public repositories where secret scanning is enabled.
If a scan results in a potential secret, Github generates a secret scanning alert to notify repository administrators.
Triage and response
- Determine if the detected secret is considered sensitive for your environment.
- If the publishing of the detected secret poses a risk to other systems, begin your incident response process and investigate.