1
0
mirror of synced 2025-12-19 09:57:42 -05:00
Files
docs/data/variables/secret-scanning.yml

27 lines
1.8 KiB
YAML

# Variables used in secret scanning that are not product names
partner_alerts: 'secret scanning alerts for partners' # GitHub.com feature for public repos only
partner_alerts_caps: 'Secret scanning alerts for partners'
user_alerts: >-
{% ifversion fpt or ghec %}secret scanning alerts for users{% else %}secret scanning{% endif %}
user_alerts_caps: >-
{% ifversion fpt or ghec %}Secret scanning alerts for users{% else %}Secret scanning{% endif %}
alerts: 'secret scanning alerts'
alerts_caps: 'Secret scanning alerts'
custom-pattern-regular-expression-generator: 'regular expression generator'
custom-pattern-regular-expression-generator-caps: 'Regular expression generator'
copilot-secret-scanning: 'Copilot secret scanning'
generic-secret-detection: 'generic secret detection'
generic-secret-detection-caps: 'Generic secret detection'
roi-calculator: 'ROI calculator'
pricing-calculator: 'pricing calculator'
# Secret risk assessment call to action links. If changing the links below, also update the hard-coded link in /code-security/index.md
secret-risk-assessment-cta-link: '/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/assess-your-secret-risk'
secret-risk-assessment-cta-text: 'Find out how to run a free secret risk assessment'
secret-risk-assessment-cta-product: '[<span class="btn btn-primary mt-3 mr-3 no-underline">{% data variables.secret-scanning.secret-risk-assessment-cta-text %}</span>](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#generating-an-initial-secret-risk-assessment)'
# Combined to provide a secret to demonstrate push protection. Dummy secret, no access.
learner-example-secret-a: 'secret_scanning_ab85fc6f8d76'
learner-example-secret-b: '38cf1c11da812da308d43_abcde'