About secret scanning patterns
GitHub maintains these different sets of default secret scanning patterns:
-
Partner patterns. Used to detect potential secrets in all public repositories. To find out about our partner program, see "Secret scanning partner program."
-
User alert patterns. Used to detect potential secrets in public repositories with secret scanning alerts for users enabled.
Owners of public repositories, as well as organizations using GitHub Enterprise Cloud with GitHub Advanced Security, can enable secret scanning alerts for users on their repositories.
For details about all the supported patterns, see the "Supported secrets section below.
If you believe that secret scanning should have detected a secret committed to your repository, and it has not, you first need to check that GitHub supports your secret. For more information, refer to the sections below. For more advanced troubleshooting information, see "Troubleshooting secret scanning."
About partner alerts
Partner alerts are alerts that are sent to the secret providers whenever a secret leak is reported for one of their secrets. GitHub currently scans public repositories for secrets issued by specific service providers and alerts the relevant service provider whenever a secret is detected in a commit. For more information about secret scanning alerts for partners, see "About secret scanning."
If access to a resource requires paired credentials, then secret scanning will create an alert only when both parts of the pair are detected in the same file. This ensures that the most critical leaks are not hidden behind information about partial leaks. Pair matching also helps reduce false positives since both elements of a pair must be used together to access the provider's resource.
About user alerts
User alerts are alerts that are reported to users on GitHub. When secret scanning alerts for users are enabled, GitHub scans repositories for secrets issued by a large variety of service providers and generates secret scanning alerts.
You can see these alerts on the Security tab of the repository. For more information about secret scanning alerts for users, see "About secret scanning."
If access to a resource requires paired credentials, then secret scanning will create an alert only when both parts of the pair are detected in the same file. This ensures that the most critical leaks are not hidden behind information about partial leaks. Pair matching also helps reduce false positives since both elements of a pair must be used together to access the provider's resource.
If you use the REST API for secret scanning, you can use the Secret type
to report on secrets from specific issuers. For more information, see "Secret scanning."
Supported secrets
This table lists the secrets supported by secret scanning. You can see the types of alert that get generated for each token, as well as whether a validity check is performed on the token.
- Provider—name of the token provider.
- Partner—token for which leaks are reported to the relevant token partner. Applies to public repositories only.
- User—token for which leaks are reported to users on GitHub. Applies to public repositories, and to private repositories where GitHub Advanced Security is enabled.
- Validity check—token for which a validity check is implemented. Currently only applies to GitHub tokens.
Provider | Token | Partner | User | Validity check |
---|---|---|---|---|
Adafruit IO | adafruit_io_key | |||
Adobe | adobe_device_token | |||
Adobe | adobe_jwt | |||
Adobe | adobe_service_token | |||
Adobe | adobe_short_lived_access_token | |||
Alibaba Cloud | alibaba_cloud_access_key_id alibaba_cloud_access_key_secret | |||
Amazon Web Services (AWS) | aws_access_key_id aws_secret_access_key | |||
Atlassian | atlassian_api_token | |||
Atlassian | atlassian_jwt | |||
Azure | azure_active_directory_application_secret | |||
Azure | azure_batch_key_identifiable | |||
Azure | azure_cosmosdb_key_identifiable | |||
Azure | azure_devops_personal_access_token | |||
Azure | azure_ml_studio_classic_web_service_key azure_ml_web_service_classic_identifiable_key | |||
Azure | azure_sas_token | |||
Azure | azure_search_admin_key | |||
Azure | azure_search_query_key | |||
Azure | azure_management_certificate | |||
Azure | azure_sql_connection_string | |||
Azure | azure_storage_account_key | |||
Canadian Digital Service | cds_canada_notify_api_key | |||
Checkout.com | checkout_production_secret_key | |||
Checkout.com | checkout_test_secret_key | |||
Chief Tools | chief_tools_token | |||
Clojars | clojars_deploy_token | |||
CloudBees CodeShip | codeship_credential | |||
Contributed Systems | CONTRIBUTED_SYSTEMS_CREDENTIALS | |||
Databricks | databricks_access_token | |||
Datadog | DATADOG_API_KEY | |||
DevCycle | devcycle_client_api_key | |||
DevCycle | devcycle_server_api_key | |||
DigitalOcean | digitalocean_oauth_token | |||
DigitalOcean | digitalocean_personal_access_token | |||
DigitalOcean | digitalocean_refresh_token | |||
DigitalOcean | digitalocean_system_token | |||
Discord | discord_bot_token | |||
Doppler | doppler_audit_token | |||
Doppler | doppler_cli_token | |||
Doppler | doppler_personal_token | |||
Doppler | doppler_scim_token | |||
Doppler | doppler_service_token | |||
Dropbox | dropbox_access_token | |||
Dropbox | dropbox_short_lived_access_token | |||
Dynatrace | dynatrace_access_token | |||
Dynatrace | dynatrace_internal_token | |||
Figma | figma_pat | |||
Finicity | finicity_app_key | |||
Frame.io | frameio_developer_token | |||
Frame.io | frameio_jwt | |||
FullStory | fullstory_api_key | |||
GitHub | github_app_installation_access_token | |||
GitHub | github_oauth_access_token | |||
GitHub | github_personal_access_token | |||
GitHub | github_refresh_token | |||
GitHub | github_ssh_private_key | |||
GoCardless | gocardless_live_access_token | |||
GoCardless | gocardless_sandbox_access_token | |||
Google Cloud | google_api_key | |||
Google Cloud | google_cloud_private_key_id | |||
Hashicorp Terraform | terraform_api_token | |||
Hubspot | hubspot_api_key | |||
Hubspot | hubspot_api_personal_access_key | |||
Ionic | ionic_personal_access_token | |||
Ionic | ionic_refresh_token | |||
JD Cloud | jd_cloud_access_key | |||
Linear | linear_api_key | |||
Linear | linear_oauth_access_token | |||
LocalStack | localstack_api_key | |||
Mailchimp | mailchimp_api_key | |||
Mailchimp | MANDRILL_API | |||
Mailgun | mailgun_api_key | |||
MessageBird | messagebird_api_key | |||
Meta | facebook_access_token | |||
npm | npm_access_token | |||
NuGet | nuget_api_key | |||
Octopus Deploy | octopus_deploy_api_key | |||
OpenAI | openai_api_key | |||
Palantir | palantir_jwt | |||
PlanetScale | planetscale_database_password | |||
PlanetScale | planetscale_oauth_token | |||
PlanetScale | planetscale_service_token | |||
Plivo | plivo_auth_id plivo_auth_token | |||
Postman | postman_api_key | |||
Prefect | prefect_server_api_key | |||
Prefect | PREFECT_USER_API_TOKEN | |||
Proctorio | proctorio_consumer_key | |||
Proctorio | proctorio_linkage_key | |||
Proctorio | proctorio_registration_key | |||
Proctorio | proctorio_secret_key | |||
Pulumi | pulumi_access_token | |||
PyPI | pypi_api_token | |||
ReadMe | readmeio_api_access_token | |||
redirect.pizza | redirect_pizza_api_token | |||
RubyGems | rubygems_api_key | |||
Samsara | samsara_api_token | |||
Samsara | samsara_oauth_access_token | |||
Segment | segment_public_api_token | |||
SendGrid | sendgrid_api_key | |||
Sendinblue | sendinblue_api_key | |||
Sendinblue | sendinblue_smtp_key | |||
Shopify | shopify_access_token | |||
Shopify | shopify_app_shared_secret | |||
Shopify | shopify_custom_app_access_token | |||
Shopify | shopify_private_app_password | |||
Slack | slack_api_token | |||
Slack | slack_incoming_webhook_url | |||
Slack | slack_workflow_webhook_url | |||
SSLMate | sslmate_api_key | |||
SSLMate | sslmate_cluster_secret | |||
Stripe | stripe_live_restricted_key | |||
Stripe | stripe_live_secret_key | |||
Stripe | stripe_test_restricted_key | |||
Stripe | stripe_test_secret_key | |||
Supabase | supabase_service_key | |||
Telnyx | telnyx_api_v2_key | |||
Tencent Cloud | tencent_cloud_secret_id | |||
Tencent WeChat | tencent_wechat_api_app_id | |||
Twilio | twilio_account_sid | |||
Twilio | twilio_api_key | |||
Typeform | typeform_personal_access_token | |||
Uniwise | wiseflow_api_key | |||
WakaTime | wakatime_pp_secret | |||
WakaTime | wakatime_oauth_access_token | |||
WakaTime | wakatime_oauth_refresh_token | |||
Yandex | yandex_iam_access_secret | |||
Yandex | yandex_cloud_api_key | |||
Yandex | yandex_cloud_iam_cookie | |||
Yandex | yandex_cloud_iam_token | |||
Yandex | yandex_dictionary_api_key | |||
Yandex | YANDEX_PASSPORT_OAUTH_TOKEN | |||
Zuplo | zuplo_consumer_api_key |