You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What do you think about secret scanning's new one-click reporting feature?
On-demand revocation for GitHub personal access tokens
You can now report compromised GitHub personal access tokens to GitHub, directly from a secret scanning alert! When you let GitHub know that the secret has been compromised, GitHub will treat the token like a publicly leaked token and revoke it. This change simplifies remediation and makes it more easily actionable.
Soon, we’d love to extend this functionality to additional token issuers – so you disclose compromised credentials and initiate these remediation flows with the issuer, without having to leak the token publicly.
If you’ve had a chance to try out the beta feature, we'd love to hear your feedback on: 1) how we can make the feature more useful for you (e.g. organization-level policies for auto-reporting certain types of secrets in private repositories), 2) what token issuers are top of mind for you, 3) what you’d like us to tackle next!
📖 Helpful information and some friendly reminders:
👂 Feedback WantedGitHub is asking for your feedback📣 ANNOUNCEMENTAnnouncements from the GitHub Community teamCode SecurityBuild security into your GitHub workflow with features to keep your codebase secureQuestion
1 participant
Heading
Bold
Italic
Quote
Code
Link
Numbered list
Unordered list
Task list
Attach files
Mention
Reference
Menu
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
What do you think about secret scanning's new one-click reporting feature?
On-demand revocation for GitHub personal access tokens
You can now report compromised GitHub personal access tokens to GitHub, directly from a secret scanning alert! When you let GitHub know that the secret has been compromised, GitHub will treat the token like a publicly leaked token and revoke it. This change simplifies remediation and makes it more easily actionable.
Soon, we’d love to extend this functionality to additional token issuers – so you disclose compromised credentials and initiate these remediation flows with the issuer, without having to leak the token publicly.
If you’ve had a chance to try out the beta feature, we'd love to hear your feedback on: 1) how we can make the feature more useful for you (e.g. organization-level policies for auto-reporting certain types of secrets in private repositories), 2) what token issuers are top of mind for you, 3) what you’d like us to tackle next!
📖 Helpful information and some friendly reminders:
Beta Was this translation helpful? Give feedback.
All reactions