diff --git a/content/code-security/secret-scanning/introduction/supported-secret-scanning-patterns.md b/content/code-security/secret-scanning/introduction/supported-secret-scanning-patterns.md index 3e5a7e216a..1aa6912aa7 100644 --- a/content/code-security/secret-scanning/introduction/supported-secret-scanning-patterns.md +++ b/content/code-security/secret-scanning/introduction/supported-secret-scanning-patterns.md @@ -101,6 +101,18 @@ In addition to these generic non-provider patterns, {% data variables.product.pr Service providers update the patterns used to generate tokens periodically and may support more than one version of a token. Push protection only supports the most recent token versions that {% data variables.product.prodname_secret_scanning %} can identify with confidence. This avoids push protection blocking commits unnecessarily when a result may be a false positive, which is more likely to happen with legacy tokens. +#### Multi-part secrets + + + +By default, {% data variables.product.prodname_secret_scanning %} supports validation for pair-matched access keys and key IDs. + +{% data variables.product.prodname_secret_scanning_caps %} also supports validation for individual key IDs for Amazon AWS Access Key IDs, in addition to existing pair matching. + +A key ID will show as active if {% data variables.product.prodname_secret_scanning %} confirms the key ID exists, regardless of whether or not a corresponding access key is found. The key ID will show as `inactive` if it's invalid (for example, if it is not a real key ID). + +Where a valid pair is found, the {% data variables.product.prodname_secret_scanning %} alerts will be linked. + ## Further reading * [AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning/about-alerts) diff --git a/src/secret-scanning/data/public-docs.yml b/src/secret-scanning/data/public-docs.yml index e167d5ed29..252a5d612e 100644 --- a/src/secret-scanning/data/public-docs.yml +++ b/src/secret-scanning/data/public-docs.yml @@ -199,6 +199,7 @@ isPrivateWithGhas: true hasPushProtection: true hasValidityCheck: '{% ifversion fpt or ghes %}false{% else %}true{% endif %}' + ismultipart: true base64Supported: false isduplicate: false - provider: Amazon AWS diff --git a/src/secret-scanning/middleware/secret-scanning.ts b/src/secret-scanning/middleware/secret-scanning.ts index 5d68d398a3..8feb9cabbd 100644 --- a/src/secret-scanning/middleware/secret-scanning.ts +++ b/src/secret-scanning/middleware/secret-scanning.ts @@ -46,6 +46,9 @@ export default async function secretScanning( if (entry.isduplicate) { entry.secretType += '
Token versions' } + if (entry.ismultipart) { + entry.secretType += '
Multi-part secrets' + } }) return next() diff --git a/src/types.ts b/src/types.ts index f7b32ce768..db399ccb59 100644 --- a/src/types.ts +++ b/src/types.ts @@ -311,6 +311,7 @@ export type SecretScanningData = { isPrivateWithGhas: boolean hasPushProtection: boolean hasValidityCheck: boolean | string + ismultipart?: boolean base64Supported: boolean isduplicate: boolean }