background Layer 1

GitHub started automatically blocking API token and key leaks for all repositories

544
GitHub now automatically blocks leaks of sensitive information such as API keys and access tokens for all publicly available code repositories. This feature prevents leaks in advance by scanning secrets before "git push" operations are accepted and works with 69 types of tokens (API keys, private keys, secret keys, authentication tokens, access tokens, management certificates, credentials, etc.).
"If you send a secret, an anti-sending protection prompt will appear with information about its type, location, and how to prevent disclosure," GitHub noted.

The platform explained that the push notification protection only blocks secrets with low false positives.

According to GitHub, developers have successfully prevented about 17,000 accidental disclosures of sensitive information since the beta version of this protection was launched, saving more than 95,000 hours of work.

While the feature only worked for private repositories by organizations with a GitHub Advanced Security license until now, it is now publicly available and activated for free.

Organizations with GitHub Advanced Security can enable Covert Scanning Protection at either the repository level, the organization level, or through the API or UI.

How to enable stealth scanning protection:

  • Go to GitHub.com to the organization's home page;
  • under its name, select "Settings;
  • In the "Security" section of the sidebar, click on "Security and Code Analysis;
  • find "GitHub Advanced Security;
  • under "Secret Scanning," click "Enable All" next to "Mailing Protection;
  • if necessary, click "Automatically enable for private repositories added to secret scanning.

You can also enable the feature for individual repositories by activating it in the Settings > Security and Analysis > GitHub Advanced Security dialog box.
More information about using the feature is available on the GitHub documentation site.

In December, GitHub announced the introduction of support for free scanning of public secrets, such as credentials and authentication tokens, in all publicly available repositories.

The platform also announced that by the end of 2023 it will require all users who add code to the platform to include two-factor authentication as an additional measure to protect their accounts. Starting in March, the requirement applies to specific groups of users, including developers who publish packages, OAuth applications and GitHub handlers, build releases, participate in the development of critical npm ecosystem projects, OpenSSF, PyPI and RubyGems, and work on four million of the most popular repositories.

The integration of Artificial Intelligence (AI) into business operations marks a transformative era, enhancing efficiency and innovation across industries. From revolutionizing HR with automated recruitment to aiding early disease detection in healthcare, AI's impact is profound. It enables predictive cybersecurity, personalized customer interactions, and accelerated software development in IT. 

Lots of news from technology vendors and modern cases on how to use data analytics for operations excellence – this is what March brought us this year.

In this issue we looked at the drivers and bright trends in retail. AI will undoubtedly be the leader among technologies for several years ahead in retail, and in the economy in general. Its emergence in wide access has opened up incredible opportunities for improving business efficiency.

“Before the automation introduction, the process was complicated by the fact that the address system was stationary, not dynamic. We could not automate serial and batch accounting of products. It was not possible to automate the warehouse replenishment processes, both planned and on order. The accounting system did not reflect all goods movements,” says Alexander Permyakov, head of the warehouse complex.

We use cookies for analytical purposes and to deliver you the best experience with our website. Continuing to the site, you agree to the Cookie Policy.