Skip to main content

Enterprise Server 3.15 目前作为候选发布提供。

为非提供程序模式启用机密扫描

可以启用 secret scanning 来检测存储库和组织级别的其他潜在机密。

谁可以使用此功能?

具有管理员角色的存储库所有者、组织所有者、安全管理员和用户

Scanning for non-provider patterns is available for the following repositories:

  • Public, private, and internal repositories in organizations using GitHub Enterprise Cloud with GitHub Advanced Security enabled

Enabling scanning for non-provider patterns

Note

The detection of non-provider patterns is currently in beta and subject to change.

You can enable scanning for non-provider patterns. Non-provider patterns correspond to secrets such as private keys and they have a higher ratio of false positives.

For more information about non-provider patterns, see "Supported secret scanning patterns."

Enabling detection of non-provider patterns for a repository

  1. On GitHub, navigate to the main page of the repository.

  2. Under your repository name, click Settings. If you cannot see the "Settings" tab, select the dropdown menu, then click Settings.

    Screenshot of a repository header showing the tabs. The "Settings" tab is highlighted by a dark orange outline.

  3. In the "Security" section of the sidebar, click Code security and analysis.

  4. Under Secret scanning, to the right of "Non-provider patterns", click Enable.

Enabling detection of non-provider patterns for an organization

You can enable scanning for non-provider patterns at the organization level by applying a custom security configuration. For more information, see "Creating a custom security configuration."

Further reading