Nota: Tu administrador de sitio debe habilitar el escaneo de secretos para tu instancia de GitHub Enterprise Server antes de que puedas utilizar esta característica. Para obtener más información, consulta "Configurar el escaneo de secretos en tu aplicativo."
About escaneo de secretos
If your project communicates with an external service, you might use a token or private key for authentication. Tokens and private keys are examples of secrets that a service provider can issue. If you check a secret into a repository, anyone who has read access to the repository can use the secret to access the external service with your privileges. We recommend that you store secrets in a dedicated, secure location outside of the repository for your project.
Escaneo de secretos will scan your entire Git history on all branches present in your GitHub repository for any secrets. Service providers can partner with GitHub to provide their secret formats for scanning. For details of the supported secrets and service providers, see "Escaneo de secretos partners."
To find out about our partner program, see "Escaneo de secretos partner program" in the Nube de GitHub Enterprise documentation
About escaneo de secretos on GitHub Enterprise Server
Escaneo de secretos is available on all organization-owned repositories as part of GitHub Advanced Security. It is not available on user-owned repositories.
If you're a repository administrator or an organization owner, you can enable escaneo de secretos for repositories that are owned by organizations. You can enable escaneo de secretos for all your organization's repositories, or for all new repositories within your organization. For more information, see "Managing security and analysis settings for your repository" and "Managing security and analysis settings for your organization."
Versions 3.1 and lower of GitHub Enterprise Server do not allow you to define your own patterns for detecting secrets.
About escaneo de secretos alerts
When you push commits to a repository with escaneo de secretos enabled, GitHub scans the contents of the commits for secrets.
When escaneo de secretos detects a secret in a repository, GitHub generates an alert.
-
GitHub sends an email alert to the repository administrators and organization owners.
-
GitHub displays an alert in the repository. For more information, see "Managing alerts from escaneo de secretos."
Repository administrators and organization owners can grant users and teams access to escaneo de secretos alerts. For more information, see "Managing security and analysis settings for your repository."