Skip to content

Commit 2a00fd9

Browse files
authored
Merge branch 'main' into patch-2
2 parents b71d10a + 3d238db commit 2a00fd9

File tree

7 files changed

+83
-27
lines changed

7 files changed

+83
-27
lines changed

content/code-security/secret-scanning/managing-alerts-from-secret-scanning/evaluating-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ allowTitleToDifferFromFilename: true
2222
There are some additional features that can help you to evaluate alerts in order to better prioritize and manage them. You can:
2323

2424
* Check the validity of a secret, to see if the secret is still active. {% ifversion fpt or ghes %}**Applies to {% data variables.product.company_short %} tokens only**.{% endif %} For more information, see "[Checking a secret's validity](#checking-a-secrets-validity)."{% ifversion secret-scanning-validity-check-partner-patterns %}
25-
* Perform an "on-demand" validity check, to get the most up to date validation status. For more information, see "[Performing an on-demand-validity-check](#performing-an-on-demand-validity-check)."{% endif %}
25+
* Perform an "on-demand" validity check, to get the most up to date validation status. For more information, see "[Performing an on-demand validity check](#performing-an-on-demand-validity-check)."{% endif %}
2626
* Review a token's metadata. **Applies to {% data variables.product.company_short %} tokens only**. For example, to see when the token was last used. For more information, see "[Reviewing {% data variables.product.company_short %} token metadata](#reviewing-github-token-metadata)."{% ifversion secret-scanning-multi-repo-public-leak %}
2727
* Review the labels assigned to the alert. For more information, see "[Reviewing alert labels](#reviewing-alert-labels)."{% endif %}
2828

content/code-security/secret-scanning/managing-alerts-from-secret-scanning/resolving-alerts.md

Lines changed: 38 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,18 +19,48 @@ allowTitleToDifferFromFilename: true
1919

2020
## Fixing alerts
2121

22-
Once a secret has been committed to a repository, you should consider the secret compromised. {% data variables.product.prodname_dotcom %} recommends the following actions for compromised secrets:
22+
Once a secret has been committed to a repository, you should consider the secret compromised. {% data variables.product.github %} recommends the following actions for compromised secrets:
2323

24-
* For a compromised {% data variables.product.prodname_dotcom %} {% data variables.product.pat_generic %}, delete the compromised token, create a new token, and update any services that use the old token. For more information, see "[AUTOTITLE](/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token)."
25-
{%- ifversion token-audit-log %}
26-
* {% ifversion ghec %}If your organization is owned by an enterprise account, identify{% else %}Identify{% endif %} any actions taken by the compromised token on your enterprise's resources. For more information, see "[AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/identifying-audit-log-events-performed-by-an-access-token)."
27-
{%- endif %}
28-
* For all other secrets, first verify that the secret committed to {% data variables.product.product_name %} is valid. If so, create a new secret, update any services that use the old secret, and then delete the old secret.
24+
* Verify that the secret committed to {% data variables.product.github %} is valid. {% ifversion fpt or ghes %}**Applies to {% data variables.product.github %} tokens only**. See "[Checking a secret's validity](/code-security/secret-scanning/managing-alerts-from-secret-scanning/evaluating-alerts#checking-a-secrets-validity)."{% endif %}{% ifversion secret-scanning-validity-check-partner-patterns %}See "[Performing an on-demand validity check](/code-security/secret-scanning/managing-alerts-from-secret-scanning/evaluating-alerts#performing-an-on-demand-validity-check)".{% endif %}{% ifversion secret-scanning-report-secret-github-pat %}
25+
* For secrets detected in private repositories, report the leaked secret to {% data variables.product.github %}, who will treat it like any publicly leaked secret and revoke it. **Applies to {% data variables.product.github %} {% data variables.product.pat_generic %}s only**. See "[Reporting a leaked secret](#reporting-a-leaked-secret)." {% endif %}
26+
* Review and update any services that use the old token. For {% data variables.product.github %} {% data variables.product.pat_generic %}s, delete the compromised token and create a new token. See "[AUTOTITLE](/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token)."
27+
* Depending on the secret provider, check your security logs for any unauthorized activity.
2928

30-
{% ifversion fpt or ghec %}
29+
{% ifversion secret-scanning-report-secret-github-pat %}
30+
31+
### Reporting a leaked secret
3132

3233
> [!NOTE]
33-
> If a secret is detected in a public repository on {% data variables.product.prodname_dotcom %} and the secret also matches a partner pattern, an alert is generated and the potential secret is reported to the service provider. For details of partner patterns, see "[AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
34+
> {% data reusables.secret-scanning.report-secret-pat-beta-note %} The feature is currently only available for {% data variables.product.github %} {% data variables.product.pat_generic %}s (v1 and v2).
35+
36+
{% endif %}
37+
38+
{% ifversion fpt or ghec %}
39+
40+
If a secret is detected in a **public** repository on {% data variables.product.github %} and the secret also matches a supported partner pattern, the potential secret is **automatically reported** to the service provider. For details of all supported partner patterns, see "[AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
41+
42+
{% endif %}
43+
44+
{% ifversion secret-scanning-report-secret-github-pat %}
45+
46+
For secrets detected in **private** repositories, anyone who can view {% data variables.secret-scanning.alerts %} for a repository can choose to report the privately exposed secret directly to {% data variables.product.github %}.
47+
48+
By reporting the secret, the token provider will treat the privately exposed secret as if it had been publicly leaked. This means the token provider may revoke the secret, so you should first consider reviewing and updating any services that use the secret. If possible, you should also consider notifying the token owner before reporting the token, so that the token owner is aware that the secret may get revoked.
49+
50+
You will only see the option to report a privately exposed secret to {% data variables.product.github %} if the following conditions are met:
51+
52+
* The secret is a {% data variables.product.github %} {% data variables.product.pat_generic %}.
53+
* The secret's validity has not been confirmed, or the secret's validity has been confirmed as `active`.
54+
55+
{% data reusables.repositories.navigate-to-repo %}
56+
{% data reusables.repositories.sidebar-security %}
57+
1. In the left sidebar, under "Vulnerability alerts", click **{% data variables.product.prodname_secret_scanning_caps %}**.
58+
1. From the alert list, click the alert you want to view.
59+
1. In the alert view for the leaked secret, click **Report leak**.
60+
61+
> [!NOTE] In order to prevent breaking workflows, consider first rotating the secret before continuing, as disclosing it could lead to the secret being revoked. If possible, you should also reach out to the token owner to let them know about the leak and coordinate a remediation plan.
62+
63+
1. Review the information in the dialog box, then click **I understand the consequence, report this secret**.
3464

3565
{% endif %}
3666

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
# Reference: #15374
2+
# Secret scanning one-click report and revocation (for GitHub PATs only)
3+
versions:
4+
ghec: '*'

data/reusables/copilot-business-for-non-ghe/assign-licenses.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
When you have created a team in the enterprise, you can assign licenses to all members of the team.
22

3-
{% data reusables.enterprise-accounts.settings-tab %}
4-
1. Under {% octicon "gear" aria-hidden="true" %} **Settings**, click **Enterprise licensing**.
3+
{% data reusables.billing.enterprise-billing-menu %}
4+
1. Under {% octicon "credit-card" aria-hidden="true" %} **Billing & Licensing**, click **Licensing**.
55
1. In the "{% data variables.product.prodname_copilot_business_short %}" section, click **Manage seats**.
66

77
![Screenshot of the "{% data variables.product.prodname_copilot_business_short %}" section. A button, labeled "Manage seats", is highlighted with an orange outline.](/assets/images/help/copilot/copilot-business-manage-seats.png)
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Reporting a privately exposed secret to {% data variables.product.github %} is in {% data variables.release-phases.public_preview %} and subject to change.

src/secret-scanning/data/public-docs.yml

Lines changed: 35 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -498,6 +498,17 @@
498498
hasPushProtection: true
499499
hasValidityCheck: false
500500
isduplicate: false
501+
- provider: Azure
502+
supportedSecret: Azure OpenAI Key
503+
secretType: azure_openai_key
504+
versions:
505+
fpt: '*'
506+
ghec: '*'
507+
isPublic: true
508+
isPrivateWithGhas: true
509+
hasPushProtection: true
510+
hasValidityCheck: false
511+
isduplicate: false
501512
- provider: Azure
502513
supportedSecret: Azure Relay Key Identifiable
503514
secretType: azure_relay_key_identifiable
@@ -719,6 +730,17 @@
719730
hasPushProtection: true
720731
hasValidityCheck: false
721732
isduplicate: false
733+
- provider: Cfx.re
734+
supportedSecret: Cfx.re Server Key
735+
secretType: cfxre_server_key
736+
versions:
737+
fpt: '*'
738+
ghec: '*'
739+
isPublic: true
740+
isPrivateWithGhas: false
741+
hasPushProtection: false
742+
hasValidityCheck: false
743+
isduplicate: false
722744
- provider: Checkout.com
723745
supportedSecret: Checkout.com Production Secret Key
724746
secretType: checkout_production_secret_key
@@ -821,7 +843,7 @@
821843
ghes: '*'
822844
isPublic: true
823845
isPrivateWithGhas: false
824-
hasPushProtection: true
846+
hasPushProtection: false
825847
hasValidityCheck: false
826848
isduplicate: false
827849
- provider: Contentful
@@ -833,7 +855,7 @@
833855
ghes: '*'
834856
isPublic: false
835857
isPrivateWithGhas: true
836-
hasPushProtection: false
858+
hasPushProtection: true
837859
hasValidityCheck: false
838860
isduplicate: false
839861
- provider: Contributed Systems
@@ -2154,6 +2176,17 @@
21542176
hasPushProtection: false
21552177
hasValidityCheck: false
21562178
isduplicate: false
2179+
- provider: Netflix
2180+
supportedSecret: Netflix NetKey
2181+
secretType: netflix_netkey
2182+
versions:
2183+
fpt: '*'
2184+
ghec: '*'
2185+
isPublic: true
2186+
isPrivateWithGhas: false
2187+
hasPushProtection: false
2188+
hasValidityCheck: false
2189+
isduplicate: false
21572190
- provider: New Relic
21582191
supportedSecret: New Relic Insights Query Key
21592192
secretType: new_relic_insights_query_key
@@ -2588,18 +2621,6 @@
25882621
hasPushProtection: true
25892622
hasValidityCheck: false
25902623
isduplicate: false
2591-
- provider: Postman
2592-
supportedSecret: Postman API Key
2593-
secretType: postman_api_key
2594-
versions:
2595-
fpt: '*'
2596-
ghec: '*'
2597-
ghes: '>=3.5'
2598-
isPublic: true
2599-
isPrivateWithGhas: true
2600-
hasPushProtection: true
2601-
hasValidityCheck: false
2602-
isduplicate: false
26032624
- provider: Postman
26042625
supportedSecret: Postman Collection Key
26052626
secretType: postman_collection_key

src/secret-scanning/lib/config.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"sha": "e7e694827d5b0076e65765c704bd594485eee15b",
3-
"blob-sha": "612e8fb3ccba3b0278376fc88e2b9e10e486714e",
2+
"sha": "6ac440cc8b236597da752259f1d6644f226400bf",
3+
"blob-sha": "98f5cf2265e2fe9f7be69217f2073fe6fc2b23bc",
44
"targetFilename": "code-security/secret-scanning/introduction/supported-secret-scanning-patterns"
55
}

0 commit comments

Comments
 (0)