Understanding why push protection has blocked your commit
Leaked secrets can pose serious security risks to your repository and your supply chain. Push protection prevents you from accidentally introducing secrets to your codebase where they could be exploited by malicious actors.
If the repository you're contributing to on GitHub is secured by push protection, you'll encounter a push protection block whenever you:
- Push commits containing recognized secrets from the command line to the remote repository.
- Commit changes or upload files containing recognized secrets to a repository in the GitHub UI.
- Make certain requests containing recognized secrets in the REST API.
Resolving a push protection block
In order to resolve the block, you should remove the secret from the commit (or request). If you believe the secret is safe to push, you may be able to bypass the block. For more information on how to remove the secret or, if necessary, bypass the block, see:
- Verwenden von Pushschutz über die Befehlszeile
- Arbeiten mit Pushschutz in der GitHub-Benutzeroberfläche
- Arbeiten mit dem Push-Schutz über die REST-API