How-tos for customizing secret leak detection
Learn how to customize GitHub's secret leak detection tools.
Defining custom patterns for secret scanning
You can define your own custom patterns to extend the capabilities of secret scanning by generating one or more regular expressions.
Generating regular expressions for custom patterns with Copilot secret scanning
You can use Copilot シークレット スキャン's レギュラー エクスプレション ジェネレーター to write regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.
Managing custom patterns
You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.
Excluding folders and files from secret scanning
You can customize secret scanning to automatically close alerts for secrets found in specific directories or files by configuring a secret_scanning.yml file in your repository.
Enabling validity checks for your repository
Enabling validity checks on your repository helps you prioritize the remediation of alerts as it tells you if a secret is active or inactive.
Enabling extended metadata checks for your repository
Learn how to enable extended metadata checks for detected secrets so alerts detected by secret scanning include additional information that help you assess and remediate leaks faster.