[Experiment] Remove duplicate intro content (#50404)
This commit is contained in:
@@ -11,8 +11,6 @@ versions:
|
|||||||
feature: code-scanning-without-workflow
|
feature: code-scanning-without-workflow
|
||||||
---
|
---
|
||||||
|
|
||||||
## About evaluating a new {% data variables.product.prodname_code_scanning %} configuration
|
|
||||||
|
|
||||||
When you first start using {% data variables.product.prodname_code_scanning %}, you'll likely use default setup. This guide describes how to evaluate how default setup for {% data variables.product.prodname_code_scanning %} is working for you, and what steps to take if something isn't working as you expect. This guide also describes how you can customize {% data variables.product.prodname_code_scanning %} if you find that you have a specific use case that your new configuration doesn't fit.
|
When you first start using {% data variables.product.prodname_code_scanning %}, you'll likely use default setup. This guide describes how to evaluate how default setup for {% data variables.product.prodname_code_scanning %} is working for you, and what steps to take if something isn't working as you expect. This guide also describes how you can customize {% data variables.product.prodname_code_scanning %} if you find that you have a specific use case that your new configuration doesn't fit.
|
||||||
|
|
||||||
## Customizing {% data variables.product.prodname_code_scanning %}
|
## Customizing {% data variables.product.prodname_code_scanning %}
|
||||||
|
|||||||
@@ -19,8 +19,6 @@ topics:
|
|||||||
|
|
||||||
{% data reusables.code-scanning.enterprise-enable-code-scanning %}
|
{% data reusables.code-scanning.enterprise-enable-code-scanning %}
|
||||||
|
|
||||||
## About {% data variables.product.prodname_code_scanning %} with {% data variables.product.prodname_codeql %}
|
|
||||||
|
|
||||||
{% data reusables.code-scanning.about-codeql-analysis %}
|
{% data reusables.code-scanning.about-codeql-analysis %}
|
||||||
|
|
||||||
{% ifversion code-scanning-without-workflow %}
|
{% ifversion code-scanning-without-workflow %}
|
||||||
|
|||||||
@@ -21,8 +21,6 @@ topics:
|
|||||||
|
|
||||||
{% data reusables.code-scanning.enterprise-enable-code-scanning %}
|
{% data reusables.code-scanning.enterprise-enable-code-scanning %}
|
||||||
|
|
||||||
## About {% data variables.product.prodname_code_scanning %}
|
|
||||||
|
|
||||||
{% data reusables.code-scanning.about-code-scanning %}
|
{% data reusables.code-scanning.about-code-scanning %}
|
||||||
|
|
||||||
You can use {% data variables.product.prodname_code_scanning %} to find, triage, and prioritize fixes for existing problems in your code. {% data variables.product.prodname_code_scanning_caps %} also prevents developers from introducing new problems. You can schedule scans for specific days and times, or trigger scans when a specific event occurs in the repository, such as a push.
|
You can use {% data variables.product.prodname_code_scanning %} to find, triage, and prioritize fixes for existing problems in your code. {% data variables.product.prodname_code_scanning_caps %} also prevents developers from introducing new problems. You can schedule scans for specific days and times, or trigger scans when a specific event occurs in the repository, such as a push.
|
||||||
|
|||||||
@@ -24,8 +24,6 @@ redirect_from:
|
|||||||
- /code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/about-codeql-code-scanning-in-your-ci-system
|
- /code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/about-codeql-code-scanning-in-your-ci-system
|
||||||
---
|
---
|
||||||
|
|
||||||
## About the {% data variables.product.prodname_codeql_cli %}
|
|
||||||
|
|
||||||
Software developers and security researchers can secure their code
|
Software developers and security researchers can secure their code
|
||||||
using {% data variables.product.prodname_codeql %} analysis. For more information about {% data variables.product.prodname_codeql %}, see "[AUTOTITLE](/code-security/code-scanning/introduction-to-code-scanning/about-code-scanning-with-codeql#about-codeql)."
|
using {% data variables.product.prodname_codeql %} analysis. For more information about {% data variables.product.prodname_codeql %}, see "[AUTOTITLE](/code-security/code-scanning/introduction-to-code-scanning/about-code-scanning-with-codeql#about-codeql)."
|
||||||
|
|
||||||
|
|||||||
@@ -23,8 +23,6 @@ shortTitle: Dependabot alerts
|
|||||||
---
|
---
|
||||||
<!--Marketing-LINK: From /features/security/software-supply-chain page "About alerts for vulnerable dependencies ".-->
|
<!--Marketing-LINK: From /features/security/software-supply-chain page "About alerts for vulnerable dependencies ".-->
|
||||||
|
|
||||||
## About {% data variables.product.prodname_dependabot_alerts %}
|
|
||||||
|
|
||||||
{% data variables.product.prodname_dependabot_alerts %} tell you when your code depends on a package that is insecure. Often, software is built using open-source code packages from a large variety of sources. The complex relationships between these dependencies, and the ease with which malicious actors can insert malware into upstream code, mean that you may unknowingly be using dependencies that have security flaws, also known as vulnerabilities.
|
{% data variables.product.prodname_dependabot_alerts %} tell you when your code depends on a package that is insecure. Often, software is built using open-source code packages from a large variety of sources. The complex relationships between these dependencies, and the ease with which malicious actors can insert malware into upstream code, mean that you may unknowingly be using dependencies that have security flaws, also known as vulnerabilities.
|
||||||
|
|
||||||
If your code depends on a package with a security vulnerability, this can cause a range of problems for your project or the people who use it. Using a vulnerable package makes you a soft target for malicious users looking to exploit your system. For example, they may seek to get access to your code and data from your customers or contributors. You should upgrade to a secure version of the package as soon as possible.{% ifversion GH-advisory-db-supports-malware %} If your code uses malware, you need to replace the package with a secure alternative.{% endif %}
|
If your code depends on a package with a security vulnerability, this can cause a range of problems for your project or the people who use it. Using a vulnerable package makes you a soft target for malicious users looking to exploit your system. For example, they may seek to get access to your code and data from your customers or contributors. You should upgrade to a secure version of the package as soon as possible.{% ifversion GH-advisory-db-supports-malware %} If your code uses malware, you need to replace the package with a secure alternative.{% endif %}
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ topics:
|
|||||||
|
|
||||||
{% data reusables.secret-scanning.enterprise-enable-secret-scanning %}
|
{% data reusables.secret-scanning.enterprise-enable-secret-scanning %}
|
||||||
|
|
||||||
## About {% data variables.product.prodname_secret_scanning %}
|
<a name="about-secret-scanning"></a>
|
||||||
|
|
||||||
If your project communicates with an external service, you might use a token or private key for authentication. Tokens and private keys are examples of secrets that a service provider can issue. If you check a secret into a repository, anyone who has read access to the repository can use the secret to access the external service with your privileges. We recommend that you store secrets in a dedicated, secure location outside of the repository for your project.
|
If your project communicates with an external service, you might use a token or private key for authentication. Tokens and private keys are examples of secrets that a service provider can issue. If you check a secret into a repository, anyone who has read access to the repository can use the secret to access the external service with your privileges. We recommend that you store secrets in a dedicated, secure location outside of the repository for your project.
|
||||||
|
|
||||||
@@ -75,7 +75,7 @@ You cannot change the configuration of {% data variables.product.prodname_secret
|
|||||||
|
|
||||||
{% data variables.secret-scanning.user_alerts_caps %} is available {% ifversion secret-scanning-user-owned-repos %}{% ifversion ghes %}on all repositories with a license for {% data variables.product.prodname_GH_advanced_security %}{% else %}for free on all public repositories, and for private and internal repositories that are owned by organizations using {% data variables.product.prodname_ghe_cloud %} with a license for {% data variables.product.prodname_GH_advanced_security %}{% endif %}{% elsif fpt %}for free on all public repositories that you own{% else %}on all organization-owned repositories with a license for {% data variables.product.prodname_GH_advanced_security %}. The feature is not available on user-owned repositories{% endif %}. {% data reusables.secret-scanning.secret-scanning-user-owned-repos-beta %}
|
{% data variables.secret-scanning.user_alerts_caps %} is available {% ifversion secret-scanning-user-owned-repos %}{% ifversion ghes %}on all repositories with a license for {% data variables.product.prodname_GH_advanced_security %}{% else %}for free on all public repositories, and for private and internal repositories that are owned by organizations using {% data variables.product.prodname_ghe_cloud %} with a license for {% data variables.product.prodname_GH_advanced_security %}{% endif %}{% elsif fpt %}for free on all public repositories that you own{% else %}on all organization-owned repositories with a license for {% data variables.product.prodname_GH_advanced_security %}. The feature is not available on user-owned repositories{% endif %}. {% data reusables.secret-scanning.secret-scanning-user-owned-repos-beta %}
|
||||||
|
|
||||||
When you enable {% data variables.product.prodname_secret_scanning %} for a repository, {% data variables.product.prodname_dotcom %} scans the code for patterns that match secrets used by many service providers. {% ifversion secret-scanning-backfill-email %}When the scan is completed, {% data variables.product.prodname_dotcom %} sends an email alert to the enterprise and organization owners, even if no secrets were found.{% endif %} For more information about the repository content that is scanned, see "[About {% data variables.product.prodname_secret_scanning %}](#about-secret-scanning)" above.
|
When you enable {% data variables.product.prodname_secret_scanning %} for a repository, {% data variables.product.prodname_dotcom %} scans the code for patterns that match secrets used by many service providers. {% ifversion secret-scanning-backfill-email %}When the scan is completed, {% data variables.product.prodname_dotcom %} sends an email alert to the enterprise and organization owners, even if no secrets were found.{% endif %} For more information about the repository content that is scanned, see the [beginning of this article](#about-secret-scanning).
|
||||||
|
|
||||||
When a supported secret is leaked, {% data variables.product.product_name %} generates a {% data variables.product.prodname_secret_scanning %} alert. {% ifversion secret-scanning-backfills %}{% data variables.product.prodname_dotcom %} will also periodically run a full git history scan of existing content in {% ifversion fpt %}public{% else %}{% data variables.product.prodname_GH_advanced_security %}{% endif %} repositories where {% data variables.product.prodname_secret_scanning %} is enabled, and send alert notifications following the {% data variables.product.prodname_secret_scanning %} alert notification settings.{% endif %}{% ifversion secret-scanning-non-provider-patterns %} User alerts can be of two types: high confidence alerts, or non-provider alerts.{% endif %} For more information, see "{% ifversion fpt or ghec %}[About user alerts](/code-security/secret-scanning/secret-scanning-patterns#about-user--alerts){% else %}[{% data variables.product.prodname_secret_scanning_caps %} patterns](/code-security/secret-scanning/secret-scanning-patterns#about-user-secret-scanning-alerts){% endif %}."
|
When a supported secret is leaked, {% data variables.product.product_name %} generates a {% data variables.product.prodname_secret_scanning %} alert. {% ifversion secret-scanning-backfills %}{% data variables.product.prodname_dotcom %} will also periodically run a full git history scan of existing content in {% ifversion fpt %}public{% else %}{% data variables.product.prodname_GH_advanced_security %}{% endif %} repositories where {% data variables.product.prodname_secret_scanning %} is enabled, and send alert notifications following the {% data variables.product.prodname_secret_scanning %} alert notification settings.{% endif %}{% ifversion secret-scanning-non-provider-patterns %} User alerts can be of two types: high confidence alerts, or non-provider alerts.{% endif %} For more information, see "{% ifversion fpt or ghec %}[About user alerts](/code-security/secret-scanning/secret-scanning-patterns#about-user--alerts){% else %}[{% data variables.product.prodname_secret_scanning_caps %} patterns](/code-security/secret-scanning/secret-scanning-patterns#about-user-secret-scanning-alerts){% endif %}."
|
||||||
|
|
||||||
|
|||||||
@@ -13,14 +13,6 @@ topics:
|
|||||||
---
|
---
|
||||||
{% data reusables.secret-scanning.beta-custom-pattern-regular-expression-generator %}
|
{% data reusables.secret-scanning.beta-custom-pattern-regular-expression-generator %}
|
||||||
|
|
||||||
## About the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %}
|
|
||||||
|
|
||||||
Custom patterns are formatted as regular expressions. You can manually type in a regular expression on {% data variables.product.prodname_dotcom %}, or you can use the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %}. {% data reusables.secret-scanning.regular-expression-generator-overview %}
|
|
||||||
|
|
||||||
For instructions on how to generate a regular expression manually for your repository or organization, see "[AUTOTITLE](/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning)."
|
|
||||||
|
|
||||||
For more information about the generator, see "[AUTOTITLE](/code-security/secret-scanning/about-the-regular-expression-generator-for-custom-patterns)."
|
|
||||||
|
|
||||||
## Generating a regular expression for a repository using the generator
|
## Generating a regular expression for a repository using the generator
|
||||||
|
|
||||||
{% data reusables.repositories.navigate-to-repo %}
|
{% data reusables.repositories.navigate-to-repo %}
|
||||||
@@ -54,3 +46,7 @@ For more information about the generator, see "[AUTOTITLE](/code-security/secret
|
|||||||
{% data reusables.advanced-security.secret-scanning-create-custom-pattern %}
|
{% data reusables.advanced-security.secret-scanning-create-custom-pattern %}
|
||||||
|
|
||||||
{% data reusables.secret-scanning.link-to-push-protection %}
|
{% data reusables.secret-scanning.link-to-push-protection %}
|
||||||
|
|
||||||
|
## Further reading
|
||||||
|
|
||||||
|
- "[AUTOTITLE](/code-security/secret-scanning/about-the-regular-expression-generator-for-custom-patterns)"
|
||||||
|
|||||||
Reference in New Issue
Block a user