X Tutup
The Wayback Machine - https://web.archive.org/web/20200731200333/https://github.com/github/roadmap/issues/106
Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secret scanning for private repositories (Server) #106

Open
github-product-roadmap opened this issue Jul 24, 2020 · 0 comments
Open

Secret scanning for private repositories (Server) #106

github-product-roadmap opened this issue Jul 24, 2020 · 0 comments

Comments

@github-product-roadmap
Copy link
Collaborator

@github-product-roadmap github-product-roadmap commented Jul 24, 2020

Summary
This feature extends support for secret scanning to private repositories. For private repositories, GitHub does not automatically send a request to the issuer to revoke the checked-in token. Instead, results are displayed to repo/org admins in the GitHub UI for them to triage.

Intended Outcome
Token leaks are one of the most common security mistakes, and they can have severe consequences. GitHub secret scanning already looks for leaked tokens in public repositories and works with the token-issuer to notify the developer and in some cases automatically revoke the token.

How will it work?
Secret scanning for private repositories will provide more configuration, including the ability to exclude paths and files using config-as-code. In future it will also provide reporting at the organization level.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
Linked pull requests

Successfully merging a pull request may close this issue.

None yet
1 participant
You can’t perform that action at this time.
X Tutup