Secret scanning: public leak locations and alert de-duplication across an organization or enterprise - feedback #141497
Replies: 9 comments 1 reply
        
          
            
              This comment was marked as off-topic.
            
          
            
        
      
    
            
              This comment was marked as off-topic.
            
          
            
        
        
          
            
              This comment was marked as spam.
            
          
            
        
      
    
            
              This comment was marked as spam.
            
          
            
        
        
          
            
              This comment was marked as spam.
            
          
            
        
      
    
            
              This comment was marked as spam.
            
          
            
        
        
          
            
              This comment was marked as spam.
            
          
            
        
      
    
            
              This comment was marked as spam.
            
          
            
        -
| GitHub's secret scanning now tells you if a leaked secret is public or found in multiple repositories. This helps you quickly understand the risk. Soon, you’ll also be able to see exact leak locations and get API support for easier management. | 
Beta Was this translation helpful? Give feedback.
-
| This is a very useful feature, thanks! 
 I also have another feat request, tangentially related to the current topic: secret criticality. It would be handy to attach criticality levels to secret alerts. Of course committed secrets are always bad, but not all alerts are the same. There are public leaked secrets, experimental secrets, confirmed active secrets, secrets with unknown validity, critical services secrets (e.g., stripe_api_key), less important service secrets (e.g. wakatime_api_key)... They don't all carry the same weight, and it would be helpful if the alerts reflected that. If alerts can be easily and quickly prioritised by criticality, everyone's job could get a little easier. If critically becomes a feat, I'd also request to allow us to set custom criticality levels, so we can fine-tune them by secret type, repository metadata, public leak status, validity or whatever's our heart desire. Some use cases from the top of my head: a Wakatime alert can be low by default; any secret in my crown jewel repos are critical by default, secrets with  | 
Beta Was this translation helpful? Give feedback.
-
| 💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩ 
 Where to look to see what's shipping 👀 
 What you can do in the meantime 💻 
 As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ | 
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
| The new public leak and multi-repo features in GitHub's secret scan are really helpful in keeping data safe. With the public leak label, we can immediately know if a secret has leaked to a public repository, so it can be dealt with quickly before someone misuses it. Meanwhile, the multi-repo label makes it easier to track whether the same secret is spread across multiple repositories in the organization. This is very important so that we can remove duplicates more effectively and reduce the risk of exploitation. In addition, REST API and webhook support makes monitoring more automated and response faster. So, if there is a leak or duplicate alert, we can take immediate action without having to manually check one by one. With clearer information about the location of leaks, security teams can more easily manage risks and prevent bigger problems in the future. This feature is not just about detecting, but also making the data protection process more efficient. | 
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
What do you think about secret scanning's new
public leakandmulti-repoindicators?Public leak locations and duplicate alerts
To help you triage and remediate secret leaks more effectively, GitHub secret scanning now indicates if a secret detected in your repository has also leaked publicly with a
public leaklabel on the alert. The alert also indicates if the secret was exposed in other repositories across your organization or enterprise with amulti-repolabel.These labels provide additional understanding into the distribution of an exposed secret, while also making it easier to assess an alert’s risk and urgency. For example, a secret which has a known associated exposure in a public location has a higher likelihood of exploitation. Detection of public leaks is only currently supported for provider-based patterns.
The multi-repo label makes it easier to de-duplicate alerts and is supported for all secret types, including custom patterns. Both indicators apply only for newly created alerts.
Exact locations, REST API, webhook support
Coming next: you'll be able to view exact locations of known public leaks for a secret scanning alert, as well as any repository names with duplicate alerts across your organization or enterprise. Public leak and multi-repo labels will also be surfaced via the REST API and webhooks.
📖 Helpful information and some friendly reminders:
Learn more about the feature via product documentation. Let us know what you think by signing up for a 60 minute feedback session or commenting below -- we're listening!
Beta Was this translation helpful? Give feedback.
All reactions