Skip to main content

How-tos for customizing secret leak detection

Learn how to customize GitHub's secret leak detection tools.

Defining custom patterns for secret scanning

You can define your own custom patterns to extend the capabilities of secret scanning by generating one or more regular expressions.

Generating regular expressions for custom patterns with Copilot secret scanning

You can use Copilot シークレット スキャン's レギュラー エクスプレション ジェネレーター to write regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.

Managing custom patterns

You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.

Excluding folders and files from secret scanning

You can customize secret scanning to automatically close alerts for secrets found in specific directories or files by configuring a secret_scanning.yml file in your repository.

Enabling validity checks for your repository

Enabling validity checks on your repository helps you prioritize the remediation of alerts as it tells you if a secret is active or inactive.

Enabling extended metadata checks for your repository

Learn how to enable extended metadata checks for detected secrets so alerts detected by secret scanning include additional information that help you assess and remediate leaks faster.