Skip to main content

Habilitación del análisis de secretos para patrones que no son de proveedor

Puedes habilitar secret scanning para detectar posibles secretos adicionales en los niveles de repositorio y organización.

¿Quién puede utilizar esta característica?

Propietarios de repositorios, propietarios de organizaciones, administradores de seguridad y usuarios con el rol de administrador

El examen de patrones que no son de proveedor está disponible para los tipos de repositorio siguientes:

  • Repositorios propiedad de la organización en GitHub Team o GitHub Enterprise Cloud con GitHub Secret Protection habilitado

En este artículo

Enabling scanning for non-provider patterns

You can enable scanning for non-provider patterns. Non-provider patterns correspond to secrets such as private keys.

For more information about non-provider patterns, see "Supported secret scanning patterns."

Enabling detection of non-provider patterns for a repository

  1. On GitHub, navigate to the main page of the repository.

  2. Under your repository name, click Settings. If you cannot see the "Settings" tab, select the dropdown menu, then click Settings.

    Screenshot of a repository header showing the tabs. The "Settings" tab is highlighted by a dark orange outline.

  3. In the "Security" section of the sidebar, click Advanced Security.

  4. Under "Secret Protection", to the right of "Non-provider patterns", click Enable.

Enabling detection of non-provider patterns for an organization

You can enable scanning for non-provider patterns at the organization level using the GitHub-recommended security configuration or by applying a custom security configuration. For more information, see Applying the GitHub-recommended security configuration in your organization and Creating a custom security configuration.

Further reading