1
0
mirror of synced 2025-12-23 21:07:12 -05:00
Files
docs/content/code-security/secret-scanning/generating-regular-expressions-for-custom-patterns-with-ai.md
2024-07-09 22:42:40 +01:00

3.0 KiB

title, shortTitle, intro, product, versions, type, topics
title shortTitle intro product versions type topics
Generating regular expressions for custom patterns with GitHub Copilot Secret Scanning Generate custom patterns with AI {% data variables.secret-scanning.copilot-secret-scanning %} helps you generate regular expressions for custom patterns that match your input, and optionally example strings. {% data reusables.gated-features.secret-scanning %}
feature
secret-scanning-custom-pattern-ai-generated
how_to
Advanced Security
Secret scanning
AI

Generating a regular expression for a repository with {% data variables.secret-scanning.copilot-secret-scanning %}

{% data reusables.repositories.navigate-to-repo %} {% data reusables.repositories.sidebar-settings %} {% data reusables.repositories.navigate-to-code-security-and-analysis %} {% data reusables.repositories.navigate-to-ghas-settings %} {% data reusables.advanced-security.secret-scanning-new-custom-pattern %} {% data reusables.advanced-security.secret-scanning-generate-regular-expression-custom-pattern %}

  1. When you're ready to test your new custom pattern, to identify matches in the repository without creating alerts, click Save and dry run. {% data reusables.advanced-security.secret-scanning-dry-run-results %} {% data reusables.advanced-security.secret-scanning-create-custom-pattern %}

{% data reusables.secret-scanning.link-to-push-protection %}

Generating a regular expression for an organization with {% data variables.secret-scanning.copilot-secret-scanning %}

{% data reusables.profile.access_org %} {% data reusables.profile.org_settings %} {% data reusables.organizations.security-and-analysis %}

{% ifversion security-configurations %} {% data reusables.security-configurations.changed-org-settings-global-settings-callout %} For detail on using {% data variables.secret-scanning.copilot-secret-scanning %}, reference the following steps in this procedure. For more information on configuring {% data variables.product.prodname_global_settings %} for your organization, see "AUTOTITLE." {% endif %}

{% data reusables.repositories.navigate-to-ghas-settings %} {% data reusables.advanced-security.secret-scanning-new-custom-pattern %} {% data reusables.advanced-security.secret-scanning-generate-regular-expression-custom-pattern %}

  1. When you're ready to test your new custom pattern, to identify matches in selected repositories without creating alerts, click Save and dry run. {% data reusables.advanced-security.secret-scanning-dry-run-select-repos %} {% data reusables.advanced-security.secret-scanning-dry-run-results %} {% data reusables.advanced-security.secret-scanning-create-custom-pattern %}

{% data reusables.secret-scanning.link-to-push-protection %}

Further reading