Skip to main content

Viewing the secret risk assessment report for your organization

You can generate and view the secret risk assessment report for your organization from the "Security" tab.

Who can use this feature?

Organization owners and security managers

GitHub provides a secret risk assessment report that organization owners and security managers can generate to evaluate the exposure of an organization to leaked secrets. The secret risk assessment is an on-demand, point-in-time scan of the code within an organization that:

  • Shows any leaked secrets within the organization
  • Shows the kinds of secrets that are leaked outside the organization
  • Provides actionable insights for remediation For more information about the report, see About the secret risk assessment.

You can generate the secret risk assessment report for your organization, review it, and export the results to CSV.

Note

The secret risk assessment report is currently in public preview and subject to change. If you have feedback or questions, please join the discussion in GitHub Community – we’re listening.

Generating an initial secret risk assessment

  1. On GitHub, navigate to the main page of the organization.

  2. Under your organization name, click Security.

    Screenshot of the horizontal navigation bar for an organization. A tab, labeled with a shield icon and "Security," is outlined in dark orange.

  3. In the sidebar, under "Security", click Assessments.

  4. To generate the secret risk assessment, click Scan your organization.

If you're an organization owner and you've opted in for email notifications, GitHub will send you an email to let you know when the report is ready to view.

Did you successfully generate the secret risk assessment report for your organization?

Yes No

Rerunning the secret risk assessment

Tip

You can only generate the report once every 90 days. We recommend that you implement GitHub Secret Protection for continuous secret monitoring and prevention. See Choosing GitHub Secret Protection.

  1. On GitHub, navigate to the main page of the organization.

  2. Under your organization name, click Security.

    Screenshot of the horizontal navigation bar for an organization. A tab, labeled with a shield icon and "Security," is outlined in dark orange.

  3. In the sidebar, under "Security", click Assessments.

  4. Towards the top right side of the existing report, click .

  5. Select Rerun scan.

    If you're an organization owner and you've opted in for email notifications, GitHub will send you an email to let you know when the report is ready to view.

Viewing the secret risk assessment

  1. On GitHub, navigate to the main page of the organization.

  2. Under your organization name, click Security.

    Screenshot of the horizontal navigation bar for an organization. A tab, labeled with a shield icon and "Security," is outlined in dark orange.

  3. In the sidebar, under "Security", click Assessments. You can see the most recent report on this page.

Exporting the secret risk assessment to CSV

  1. On GitHub, navigate to the main page of the organization.

  2. Under your organization name, click Security.

    Screenshot of the horizontal navigation bar for an organization. A tab, labeled with a shield icon and "Security," is outlined in dark orange.

  3. In the sidebar, under "Security", click Assessments.

  4. Towards the top right side of the report, click .

  5. Select Download CSV.

The secret risk assessment CSV file includes the following information.

CSV columnNameDescription
AOrganization NameThe name of the organization the secret was detected in
BNameThe token name for the type of secret
CSlugThe normalized string for the token. This corresponds to Token in the table of supported secrets. See Supported secret scanning patterns.
DPush ProtectedA boolean to indicate whether the secret would be detected and blocked by push protection if it were enabled
ENon-Provider PatternA boolean to indicate whether the secret matched a non-provider pattern and would generate an alert if secret scanning with non-provider patterns were enabled
FSecret CountAn aggregate count of the active and inactive secrets found for the token type
GRepository CountAn aggregate count of distinct repositories in which the secret type was found, including public, private, internal, and archived repositories

Next steps

Now that you've generated secret risk assessment for your organization, learn how to interpret the results. See Interpreting secret risk assessment results.