melscoop / skills-introduction-to-secret-scanning

GitHub Skills: Introduction to Secret Scanning

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Introduction to secret scanning

GitHub scans repositories for known types of secrets, such as API keys and authentication tokens, to prevent fraudulent use of secrets that were committed accidentally. In this GitHub Skills course you will learn how to enable secret scanning to identify secrets and prevent them from being committed to your repository.

Step 1: Enable Secret Scanning

Welcome to "Introduction to Secret Scanning"! 👋

In this step, you will enable secret scanning on this repository. Once secret scanning is enabled, you will add a new credential to see how secret scanning identifies the credential.

What is a secret: In the context of secret scanning, a secret (or credential) is a plain-text string, or a pair of strings, that authorizes a user to access a service. Examples could be AWS secret access keys/ID's, Google API keys, or Stripe API tokens. GitHub Docs hosts a list of all supported patterns.

⌨️ Activity 1.1: Enable secret scanning

Secret scanning is enabled by default for all new public repositories. If you're working in a public repository, you can go straight to "Activity 1.2: Commit a token." For private or internal repositories, secret scanning is available with GitHub Advanced Security.

  1. Open a new browser tab, and work on the steps in your second tab while you read the instructions in this tab.
  2. In your newly created repository, select Settings from the top navigation bar.
  3. Under the Security section on the left side, select Code security and analysis.
  4. Scroll to the bottom of this page and select the Enable button next to "Secret scanning."

Important

When you enable secret scanning, you may receive an email notification about credentials in your repository. Don't worry! The tokens in this Skills repository are inactive. There is no risk to your environment.

⌨️ Activity 1.2: Commit a token

Now that you have secret scanning enabled in this repository, let's commit a new token to see how it works. You'll commit an AWS key and access ID to the repository. Don't worry, this is an inactive token that can't be used to log in to AWS.

  1. You should continue to work on activities in a second browser tab.

  2. Click the Code tab in your repository.

  3. Display the credentials.yml file.

  4. Click the Edit button to the right.

    A screenshot of credentials.yml on the GitHub web interface with the edit button outlined

  5. Copy the following text and paste it at the bottom of the credentials.yml file.

    default:
      aws_access_key_id: AKIAQYLPMN5HNM4OZ56B
      aws_secret_access_key: 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
      output: json
      region: us-east-2
  6. Click Commit changes... at the top right. The "Commit changes" window is displayed. Leave the defaults configured, and click Commit changes to commit directly to the main branch.

  7. Wait about 20 seconds, then refresh this page (the one you're following instructions from). A GitHub Actions workflow in the repository will run and automatically replace this contents of this README file with instructions for the next step.


Get help: Post in our discussion boardReview the GitHub status page

© 2023 GitHub • Code of ConductMIT License

About

GitHub Skills: Introduction to Secret Scanning

License:MIT License