Skip to main content

Secrets in Code

This page explains how to customize the Secrets in Code scan for the application or microservice.
This function searches for plaintext access keys or credentials in the repository to increase security.

info

Supported Detectors:
Our scanning capabilities extend to a wide array of detectors, including but not limited to:

  • ArtifactoryDetector
  • AWSKeyDetector
  • AzureStorageKeyDetector
  • BasicAuthDetector
  • CloudantDetector
  • DiscordBotTokenDetector
  • GitHubTokenDetector
  • GitLabTokenDetector
  • Base64HighEntropyString
  • HexHighEntropyString
  • IbmCloudIamDetector
  • IbmCosHmacDetector
  • IPPublicDetector
  • JwtTokenDetector
  • KeywordDetector
  • MailchimpDetector
  • NpmDetector
  • OpenAIDetector
  • PrivateKeyDetector
  • PypiTokenDetector
  • SendGridDetector
  • SlackDetector
  • SoftlayerDetector
  • SquareOAuthDetector
  • StripeDetector
  • TelegramBotTokenDetector
  • TwilioKeyDetector

1. In the main branch you will edit the YAML file named .github/workflows/github-ci.yaml

2. In the github-ci.yaml file search for the Features section, you will find it like this:


## Features -------------------------------------------------------------------------------------#

3. Bellow the section title, add the following configuration and change the values as you need:

    # Secrets in Code
secrets_in_code_blocker: 'true'

4. Commit and enjoy! ✨

info

This function is executed by default for information purposes (non-blocking).
The following explains how to make it blocking for the pipeline progress.