Skip to content

Commit b39823e

Browse files
authored
Merge pull request #42521 from github/repo-sync
Repo sync
2 parents 2e7690c + 7809435 commit b39823e

File tree

13 files changed

+155
-140
lines changed

13 files changed

+155
-140
lines changed

content/code-security/concepts/secret-security/about-delegated-bypass-for-push-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ redirect_from:
1818
contentType: concepts
1919
---
2020

21-
## About delegated bypass for push protection
22-
2321
{% data reusables.secret-scanning.push-protection-delegate-bypass-beta-note %}
2422

23+
## About delegated bypass for push protection
24+
2525
When push protection is enabled for a repository, users with write access can bypass push protection and push a secret if they provide a reason and the bypass is approved.
2626

2727
With delegated bypass for push protection, you can:
@@ -33,7 +33,7 @@ With delegated bypass for push protection, you can:
3333

3434
To set up delegated bypass, organization owners or repository administrators create a list of users with bypass privileges. This designated list of users can then:
3535
* Bypass push protection, by specifying a reason for bypassing the block.
36-
* Manage (approve or deny) bypass requests coming from all other contributors. These requests are located in the "Push protection bypass" page in the **Security** tab of the repository.
36+
* Manage (approve or deny) bypass requests coming from all other contributors. These requests are located in the "Push protection bypass" page in the **Security** tab of the repository, and will expire after 7 days.
3737

3838
The following types of users can always bypass push protection without having to request bypass privileges:
3939
* Organization owners

content/code-security/concepts/secret-security/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ children:
1818
- /about-delegated-bypass-for-push-protection
1919
- /about-secret-scanning-for-partners
2020
- /github-secret-types
21+
- /push-protection-from-the-command-line
2122
- /working-with-push-protection-and-the-github-mcp-server
2223
- /working-with-push-protection-from-the-rest-api
2324
redirect_from:
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
title: Push protection from the command line
3+
shortTitle: Command line protection
4+
intro: Understand how {% data variables.product.github %} uses push protection to prevent secret leaks from the command line.
5+
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
6+
versions:
7+
fpt: '*'
8+
ghes: '*'
9+
ghec: '*'
10+
topics:
11+
- Secret scanning
12+
- Secret Protection
13+
- Alerts
14+
- Repositories
15+
contentType: concepts
16+
---
17+
18+
Push protection prevents you from accidentally committing secrets to a repository by blocking pushes containing supported secrets.
19+
20+
When you attempt to push a supported secret from the command line to a repository secured by push protection, {% data variables.product.prodname_dotcom %} will block the push.
21+
22+
You should either:
23+
24+
* **Remove** the secret from your branch. For more information, see [Resolving a blocked push](/code-security/how-tos/secure-your-secrets/work-with-leak-prevention/working-with-push-protection-from-the-command-line#resolving-a-blocked-push).
25+
* **Follow a provided URL** to see what options are available to you to allow the push. For more information, see [Bypassing push protection](/code-security/how-tos/secure-your-secrets/work-with-leak-prevention/working-with-push-protection-from-the-command-line#bypassing-push-protection) and [Requesting bypass privileges](/code-security/how-tos/secure-your-secrets/work-with-leak-prevention/working-with-push-protection-from-the-command-line#requesting-bypass-privileges).
26+
27+
Up to five detected secrets will be displayed at a time on the command line. If a particular secret has already been detected in the repository and an alert already exists, {% data variables.product.prodname_dotcom %} will not block that secret.
28+
29+
If you confirm a secret is real and that you intend to fix it later, you should aim to remediate the secret as soon as possible. For example, you might revoke the secret and remove the secret from the repository's commit history. Real secrets that have been exposed must be revoked to avoid unauthorized access. You might consider first rotating the secret before revoking it. For more information, see [AUTOTITLE](/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository).
30+
31+
{% data reusables.secret-scanning.push-protection-multiple-branch-note %}

content/code-security/concepts/vulnerability-reporting-and-management/about-coordinated-disclosure-of-security-vulnerabilities.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,17 @@ The process for reporting and disclosing vulnerabilities for projects on {% data
8080

8181
{% data reusables.security-advisory.private-vulnerability-reporting-enable %}
8282

83-
Private vulnerability reporting provides an easy way for vulnerability reporters to privately disclose security risks to repository maintainers, within {% data variables.product.prodname_dotcom %}, and in a way that immediately notifies the repository maintainers of the issue. For more information for security researchers and repository maintainers, see [AUTOTITLE](/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability) and [AUTOTITLE](/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/managing-privately-reported-security-vulnerabilities), respectively.
83+
Private vulnerability reporting provides a secure, structured way for security researchers to privately disclose security risks to repository maintainers directly within {% data variables.product.prodname_dotcom %}. When a vulnerability is reported, repository maintainers are immediately notified, allowing them to review and respond without the risk of premature public disclosure.
84+
85+
Without clear guidance on how to contact maintainers, security researchers may feel forced to disclose vulnerabilities publicly, such as by posting on social media, opening public issues, or contacting maintainers through informal channels, which can expose users to unnecessary risk. Private vulnerability reporting helps avoid these situations by offering a dedicated, private reporting workflow.
86+
87+
For security researchers, private vulnerability reporting offers:
88+
89+
* Less frustration, and less time spent trying to figure out how to contact the maintainer.
90+
* A smoother process for disclosing and discussing vulnerability details.
91+
* The opportunity to discuss vulnerability details privately with the repository maintainer.
92+
93+
For more information for security researchers and repository maintainers, see [AUTOTITLE](/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability) and [AUTOTITLE](/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/managing-privately-reported-security-vulnerabilities), respectively.
8494

8595
> [!NOTE]
8696
> If the repository containing the vulnerability doesn't have private vulnerability reporting enabled, both security researchers and repository maintainers need to follow the instructions described in the [Standard process](#standard-process) section above.

0 commit comments

Comments
 (0)