Co-authored-by: Jules Porter <jules-p@users.noreply.github.com> Co-authored-by: Dimitrios Philliou <d1m1tr10s@github.com> Co-authored-by: Sarita Iyer <66540150+saritai@users.noreply.github.com>
2.1 KiB
title, shortTitle, intro, product, permissions, versions, type, topics
| title | shortTitle | intro | product | permissions | versions | type | topics | |||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Working with push protection and the GitHub MCP server | Push protection and the GitHub MCP server | Learn how you are protected from leaking secrets during interactions with the {% data variables.product.github %} MCP server, and how to bypass a push protection block if you need to. | Public repositories on {% data variables.product.prodname_dotcom_the_website %} | {% data reusables.permissions.push-protection-resolve-block %} |
|
how_to |
|
About push protection and the {% data variables.product.github %} MCP server
Push protection prevents you from inadvertently exposing secrets, such as tokens, keys and credentials, in your repository.
When you're interacting with the {% data variables.product.github %} MCP server, push protection blocks secrets in AI-generated responses as well as preventing secrets from being included in any actions you perform, such as creating an issue.
This protection is on by default for all interactions between the {% data variables.product.github %} MCP server and public repositories; and between the {% data variables.product.github %} MCP server and private repositories covered by {% data variables.product.prodname_GHAS %}, regardless of whether push protection is enabled on the repository's security settings page.
Resolving a block
To resolve the block, you can either:
- Remove the secret from the content of your request before trying again.
- Bypass the block. If push protection is enabled for the repository, or you have push protection enabled for your personal account, you'll see an option to bypass the push protection block. You should carefully evaluate if it's safe to include the secret in your request before continuing.