Skip to main content
Frecuentemente publicamos actualizaciones de nuestra documentación. Es posible que la traducción de esta página esté en curso. Para conocer la información más actual, visita la documentación en inglés. Si existe un problema con las traducciones en esta página, por favor infórmanos.

Esta versión de GitHub Enterprise se discontinuó el 2022-06-03. No se realizarán lanzamientos de patch, ni siquiera para problemas de seguridad críticos. Para obtener un mejor desempeño, más seguridad y nuevas características, actualiza a la última versión de GitHub Enterprise. Para obtener ayuda con la actualización, contacta al soporte de GitHub Enterprise.

About secret scanning

GitHub Enterprise Server scans repositories for known types of secrets, to prevent fraudulent use of secrets that were committed accidentally.

El Escaneo de secretos se encuentra disponible para los repositorios que pertenecen a organizaciones de GitHub Enterprise Server si tu empresa tiene una licencia de GitHub Advanced Security. Para obtener más información, consulta la sección "Productos de GitHub".

Nota: Tu administrador de sitio debe habilitar el escaneo de secretos para tu instancia de GitHub Enterprise Server antes de que puedas utilizar esta característica. Para obtener más información, consulta "Configurar el escaneo de secretos en tu aplicativo."

About escaneo de secretos

If your project communicates with an external service, you might use a token or private key for authentication. Tokens and private keys are examples of secrets that a service provider can issue. If you check a secret into a repository, anyone who has read access to the repository can use the secret to access the external service with your privileges. We recommend that you store secrets in a dedicated, secure location outside of the repository for your project.

Escaneo de secretos will scan your entire Git history on all branches present in your GitHub repository for secrets.

Service providers can partner with GitHub to provide their secret formats for scanning. Para saber más sobre nuestro programa asociado, consulta el "Programa asociado de Escaneo de secretos" en la documentación de Nube de GitHub Enterprise.

About escaneo de secretos on GitHub Enterprise Server

Escaneo de secretos is available on all organization-owned repositories as part of GitHub Advanced Security. It is not available on user-owned repositories. When you enable escaneo de secretos for a repository, GitHub scans the code for patterns that match secrets used by many service providers. For more information, see "Escaneo de secretos patterns."

If you're a repository administrator you can enable >- escaneo de secretos for any repository. Organization owners can also enable >- escaneo de secretos for all repositories or for all new repositories within an organization. For more information, see "Managing security and analysis settings for your repository" and "Managing security and analysis settings for your organization."

Versions 3.1 and lower of GitHub Enterprise Server do not allow you to define your own patterns for detecting secrets.

About escaneo de secretos alerts

When you push commits to a repository with escaneo de secretos enabled, GitHub scans the contents of those commits for secrets that match patterns defined by service providers.

If escaneo de secretos detects a secret, GitHub generates an alert.

  • GitHub sends an email alert to the repository administrators and organization owners.

  • GitHub sends an email alert to the contributor who committed the secret to the repository, with a link to the related escaneo de secretos alert. The commit author can then view the alert in the repository, and resolve the alert.

  • GitHub displays an alert in the "Security" tab of the repository.

For more information about viewing and resolving escaneo de secretos alerts, see "Managing alerts from escaneo de secretos."

Repository administrators and organization owners can grant users and teams access to escaneo de secretos alerts. For more information, see "Managing security and analysis settings for your repository."

You can use the REST API to monitor results from escaneo de secretos across your repositories. For more information about API endpoints, see "Escaneo de secretos."

Further reading