How-tos for bypass requests
Learn how to use the delegated bypass feature.
Enabling delegated bypass for push protection
You can use delegated bypass for your organization or repository to control who can push commits that contain secrets identified by secret scanning.
Managing requests to bypass push protection
As a member of the bypass list for an organization or repository, you can review bypass requests from other members of the organization or repository.
Reviewing requests to bypass push protection
You can use security overview to review requests to bypass push protection from contributors pushing to repositories across your organization.