|
| 1 | +interactions: |
| 2 | + - request: |
| 3 | + body: null |
| 4 | + headers: |
| 5 | + Accept: |
| 6 | + - '*/*' |
| 7 | + Accept-Encoding: |
| 8 | + - gzip, deflate |
| 9 | + Connection: |
| 10 | + - keep-alive |
| 11 | + User-Agent: |
| 12 | + - pygitguardian/1.26.0 (Darwin;py3.11.13) ggshield |
| 13 | + method: GET |
| 14 | + uri: https://api.gitguardian.com/v1/metadata |
| 15 | + response: |
| 16 | + body: |
| 17 | + string: |
| 18 | + '{"version":"v2.331.0","preferences":{"marketplaces__aws_product_url":"http://aws.amazon.com/marketplace/pp/prodview-mrmulzykamba6","on_premise__restrict_signup":true,"on_premise__is_email_server_configured":true,"on_premise__default_sso_config_api_id":null,"on_premise__default_sso_config_force_sso":null,"onboarding__segmentation_v1_enabled":true,"onboarding__detectors_for_revocation":["github_fine_grained_pat","github_personal_access_token_v2","github_token","openai_admin_apikey","openai_apikey","openai_project_apikey","openai_project_apikey_v2"],"general__maximum_payload_size":26214400,"general__mutual_tls_mode":"disabled","general__signup_enabled":true},"secret_scan_preferences":{"maximum_documents_per_scan":20,"maximum_document_size":1048576},"remediation_messages":{"pre_commit":"> |
| 19 | + How to remediate\n\n Since the secret was detected before the commit was |
| 20 | + made:\n 1. replace the secret with its reference (e.g. environment variable).\n 2. |
| 21 | + commit again.\n\n> [To apply with caution] If you want to bypass ggshield |
| 22 | + (false positive or other reason), run:\n - if you use the pre-commit framework:\n\n SKIP=ggshield |
| 23 | + git commit -m \"<your message\"","pre_push":"> How to remediate\n\n Since |
| 24 | + the secret was detected before the push BUT after the commit, you need to:\n 1. |
| 25 | + rewrite the git history making sure to replace the secret with its reference |
| 26 | + (e.g. environment variable).\n 2. push again.\n\n To prevent having to rewrite |
| 27 | + git history in the future, setup ggshield as a pre-commit hook:\n https://docs.gitguardian.com/ggshield-docs/integrations/git-hooks/pre-commit\n\n> |
| 28 | + [Apply with caution] If you want to bypass ggshield (false positive or other |
| 29 | + reason), run:\n - if you use the pre-commit framework:\n\n SKIP=ggshield-push |
| 30 | + git push","pre_receive":"> How to remediate\n\n A pre-receive hook set server |
| 31 | + side prevented you from pushing secrets.\n\n Since the secret was detected |
| 32 | + during the push BUT after the commit, you need to:\n 1. rewrite the git history |
| 33 | + making sure to replace the secret with its reference (e.g. environment variable).\n 2. |
| 34 | + push again.\n\n To prevent having to rewrite git history in the future, setup |
| 35 | + ggshield as a pre-commit hook:\n https://docs.gitguardian.com/ggshield-docs/integrations/git-hooks/pre-commit\n\n> |
| 36 | + [Apply with caution] If you want to bypass ggshield (false positive or other |
| 37 | + reason), run:\n\n git push -o breakglass"}}' |
| 38 | + headers: |
| 39 | + access-control-expose-headers: |
| 40 | + - X-App-Version |
| 41 | + allow: |
| 42 | + - GET, HEAD, OPTIONS |
| 43 | + content-length: |
| 44 | + - '2399' |
| 45 | + content-security-policy: |
| 46 | + - frame-ancestors 'none' |
| 47 | + content-type: |
| 48 | + - application/json |
| 49 | + cross-origin-opener-policy: |
| 50 | + - same-origin |
| 51 | + date: |
| 52 | + - Thu, 13 Nov 2025 10:54:01 GMT |
| 53 | + referrer-policy: |
| 54 | + - strict-origin-when-cross-origin |
| 55 | + server: |
| 56 | + - istio-envoy |
| 57 | + strict-transport-security: |
| 58 | + - max-age=31536000; includeSubDomains |
| 59 | + vary: |
| 60 | + - Cookie |
| 61 | + x-app-version: |
| 62 | + - v2.331.0 |
| 63 | + x-content-type-options: |
| 64 | + - nosniff |
| 65 | + x-envoy-upstream-service-time: |
| 66 | + - '34' |
| 67 | + x-frame-options: |
| 68 | + - DENY |
| 69 | + x-secrets-engine-version: |
| 70 | + - 2.150.0 |
| 71 | + x-xss-protection: |
| 72 | + - 1; mode=block |
| 73 | + status: |
| 74 | + code: 200 |
| 75 | + message: OK |
| 76 | + - request: |
| 77 | + body: null |
| 78 | + headers: |
| 79 | + Accept: |
| 80 | + - '*/*' |
| 81 | + Accept-Encoding: |
| 82 | + - gzip, deflate |
| 83 | + Connection: |
| 84 | + - keep-alive |
| 85 | + User-Agent: |
| 86 | + - pygitguardian/1.26.0 (Darwin;py3.11.13) ggshield |
| 87 | + method: GET |
| 88 | + uri: https://api.gitguardian.com/v1/api_tokens/self |
| 89 | + response: |
| 90 | + body: |
| 91 | + string: '{"id":"775758eb-b33b-43e9-8ff7-4ce5f5cc73df","name":"ggshield-dev-token","type":"personal_access_token","scopes":["scan"],"member_id":1094429,"workspace_id":8,"created_at":"2025-11-13T08:27:47.394379Z","last_used_at":"2025-11-13T10:54:00Z","expire_at":"2026-05-12T08:27:47.366197Z","revoked_at":null,"status":"active","creator_id":1094429}' |
| 92 | + headers: |
| 93 | + access-control-expose-headers: |
| 94 | + - X-App-Version |
| 95 | + allow: |
| 96 | + - GET, DELETE, HEAD, OPTIONS |
| 97 | + content-length: |
| 98 | + - '339' |
| 99 | + content-security-policy: |
| 100 | + - frame-ancestors 'none' |
| 101 | + content-type: |
| 102 | + - application/json |
| 103 | + cross-origin-opener-policy: |
| 104 | + - same-origin |
| 105 | + date: |
| 106 | + - Thu, 13 Nov 2025 10:54:03 GMT |
| 107 | + referrer-policy: |
| 108 | + - strict-origin-when-cross-origin |
| 109 | + server: |
| 110 | + - istio-envoy |
| 111 | + strict-transport-security: |
| 112 | + - max-age=31536000; includeSubDomains |
| 113 | + vary: |
| 114 | + - Cookie |
| 115 | + x-app-version: |
| 116 | + - v2.331.0 |
| 117 | + x-content-type-options: |
| 118 | + - nosniff |
| 119 | + x-envoy-upstream-service-time: |
| 120 | + - '24' |
| 121 | + x-frame-options: |
| 122 | + - DENY |
| 123 | + x-secrets-engine-version: |
| 124 | + - 2.150.0 |
| 125 | + x-xss-protection: |
| 126 | + - 1; mode=block |
| 127 | + status: |
| 128 | + code: 200 |
| 129 | + message: OK |
| 130 | + - request: |
| 131 | + body: |
| 132 | + '[{"filename": "commit://staged/conflict.txt", "document": "@@ -1 +1 @@\n-Version |
| 133 | + from feature\n\\ No newline at end of file\n+Resolved version\n\\ No newline |
| 134 | + at end of file"}]' |
| 135 | + headers: |
| 136 | + Accept: |
| 137 | + - '*/*' |
| 138 | + Accept-Encoding: |
| 139 | + - gzip, deflate |
| 140 | + Connection: |
| 141 | + - keep-alive |
| 142 | + Content-Length: |
| 143 | + - '175' |
| 144 | + Content-Type: |
| 145 | + - application/json |
| 146 | + GGShield-Command-Id: |
| 147 | + - 12964ae8-7cb5-430e-b403-0df6d90d0f8c |
| 148 | + GGShield-Command-Path: |
| 149 | + - cli secret scan pre-commit |
| 150 | + GGShield-OS-Name: |
| 151 | + - darwin |
| 152 | + GGShield-OS-Version: |
| 153 | + - 'Darwin Kernel Version 24.2.0: Fri Dec 6 18:56:34 PST 2024; root:xnu-11215.61.5~2/RELEASE_ARM64_T6020' |
| 154 | + GGShield-Python-Version: |
| 155 | + - 3.11.13 |
| 156 | + GGShield-Version: |
| 157 | + - 1.44.1 |
| 158 | + User-Agent: |
| 159 | + - pygitguardian/1.26.0 (Darwin;py3.11.13) ggshield |
| 160 | + mode: |
| 161 | + - pre_commit |
| 162 | + scan_options: |
| 163 | + - '{"show_secrets": false, "ignored_detectors_count": 0, "ignored_matches_count": |
| 164 | + 0, "ignored_paths_count": 14, "ignore_known_secrets": false, "with_incident_details": |
| 165 | + false, "has_prereceive_remediation_message": false, "all_secrets": false, |
| 166 | + "source_uuid": null}' |
| 167 | + method: POST |
| 168 | + uri: https://api.gitguardian.com/v1/multiscan?all_secrets=True |
| 169 | + response: |
| 170 | + body: |
| 171 | + string: '[{"policy_break_count":0,"policies":["Secrets detection"],"policy_breaks":[],"is_diff":true}]' |
| 172 | + headers: |
| 173 | + access-control-expose-headers: |
| 174 | + - X-App-Version |
| 175 | + allow: |
| 176 | + - POST, OPTIONS |
| 177 | + content-length: |
| 178 | + - '93' |
| 179 | + content-security-policy: |
| 180 | + - frame-ancestors 'none' |
| 181 | + content-type: |
| 182 | + - application/json |
| 183 | + cross-origin-opener-policy: |
| 184 | + - same-origin |
| 185 | + date: |
| 186 | + - Thu, 13 Nov 2025 10:54:04 GMT |
| 187 | + referrer-policy: |
| 188 | + - strict-origin-when-cross-origin |
| 189 | + server: |
| 190 | + - istio-envoy |
| 191 | + strict-transport-security: |
| 192 | + - max-age=31536000; includeSubDomains |
| 193 | + vary: |
| 194 | + - Cookie |
| 195 | + x-app-version: |
| 196 | + - v2.331.0 |
| 197 | + x-content-type-options: |
| 198 | + - nosniff |
| 199 | + x-envoy-upstream-service-time: |
| 200 | + - '125' |
| 201 | + x-frame-options: |
| 202 | + - DENY |
| 203 | + x-secrets-engine-version: |
| 204 | + - 2.150.0 |
| 205 | + x-xss-protection: |
| 206 | + - 1; mode=block |
| 207 | + status: |
| 208 | + code: 200 |
| 209 | + message: OK |
| 210 | +version: 1 |
0 commit comments