You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/github/configure-use-secret-scanning-github-repository/5-exercise.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ title: Exercise
4
4
metadata:
5
5
unitType: exercise
6
6
title: Exercise - Exclude files from secret scanning
7
-
description: This exercise checks your knowledge on excluding files from being scanned by secret scanning. It's automatically graded via a workflow once you have completed the instructions.
7
+
description: This exercise checks your knowledge on excluding files from secret scanning. It's automatically graded via a workflow once you have completed the instructions.
Copy file name to clipboardExpand all lines: learn-pr/github/configure-use-secret-scanning-github-repository/includes/3-configure-secret-scanning.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ This unit walks you through the necessary steps to enable secret scanning at the
7
7
Follow these steps to enable secret scanning and push protection on a private repository:
8
8
9
9
1. In your repository, navigate to **Settings**.
10
-
1. In the **Security** section select **Advanced Security**.
10
+
1. In the **Security** section, select **Advanced Security**.
11
11
1. Select the **Enable** button next to **Secret Protection**
12
12
1. Review the impact of enabling and select **Enable Secret Protection**.
13
13
1. If you see a **Disable** button, it means that secret scanning was already enabled at organization level.
@@ -17,9 +17,9 @@ Follow these steps to enable secret scanning and push protection on a private re
17
17
18
18
## Enable secret scanning for an organization
19
19
20
-
Enabling secret scanning at the organization level ensures that secret scanning is enabled by default on all private repositories where GitHub Advanced Security is enabled. In order to configure, you'll need to setup[GitHub Advanced Security](https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security).
20
+
Enabling secret scanning at the organization level ensures that secret scanning is enabled by default on all private repositories where GitHub Advanced Security is enabled. In order to configure, you'll need to set up[GitHub Advanced Security](https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security).
21
21
22
-
Once setup, you can configure [Global Secret Scanning settings](https://docs.github.com/en/code-security/securing-your-organization/enabling-security-features-in-your-organization/configuring-global-security-settings-for-your-organization#configuring-global-secret-scanning-settings).
22
+
Once set up, you can configure [Global Secret Scanning settings](https://docs.github.com/en/code-security/securing-your-organization/enabling-security-features-in-your-organization/configuring-global-security-settings-for-your-organization#configuring-global-secret-scanning-settings).
23
23
24
24
## Exclude files from being scanned
25
25
@@ -48,13 +48,13 @@ When a new secret is detected, GitHub notifies all users with access to security
48
48
- Organization owners and enterprise owners, if they're administrators of repositories where secrets were leaked
49
49
50
50
> [!NOTE]
51
-
> Commit authors who've accidentally committed secrets will be notified, regardless of their notification preferences.
51
+
> Commit authors who have accidentally committed secrets will be notified, regardless of their notification preferences.
52
52
53
53
You'll receive an email notification if:
54
54
55
55
- You're watching the repository.
56
56
- You've enabled notifications for **All Activity** or for custom **Security alerts** on the repository.
57
-
- In your notification settings, under "Subscriptions", then under "Watching", you have selected to receive notifications by email.
57
+
- In your notification settings, under "Subscriptions," then under "Watching," you have selected to receive notifications by email.
Copy file name to clipboardExpand all lines: learn-pr/github/configure-use-secret-scanning-github-repository/includes/7-summary.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,9 @@ Secret scanning is enabled by default on all public repositories and can be enab
8
8
- Titles, descriptions, and comments in pull requests
9
9
- Titles, descriptions, and comments in GitHub Discussions
10
10
11
-
GitHub will alert you when secrets are detected so the appropriate actions can be taken to secure your code according to the type of secret that was committed. And with push protection enabled, secret leaks can be prevented by blocking commits that contain known secrets.
11
+
GitHub will alert you when secrets are detected so the appropriate actions can be taken to secure your code according to the type of secret that was committed. And with push protection enabled, secret leaks can be prevented by blocking commits that contain known secrets.
12
12
13
-
For private repositories, the secret scanning configuration options also enable you to exclude specific files from scans, choose the people to notify of alerts, and create custom patterns for the secrets in your project that aren't automatically detected by GitHub.
13
+
For private repositories, the secret scanning configuration options also enable you to exclude specific files from scans, choose the people to notify of alerts, and create custom patterns for the secrets in your project not automatically detected by GitHub.
14
14
15
15
With secret scanning in GitHub, you can be aware of exposed secrets and respond accordingly to protect your assets.
0 commit comments