Skip to main content

Interpretación de los resultados de la evaluación de riesgos de secretos

Usa los resultados del informe de secret risk assessment para mejorar la seguridad de tu organización.

Introduction

In this tutorial, you'll interpret your secret risk assessment results, and learn how to:

  • Understand risk metrics on the dashboard
  • Identify high-risk secret leaks
  • Prioritize secrets for remediation

Prerequisites

You must generate a secret risk assessment report and wait for the scan to complete. See Viewing the secret risk assessment report for your organization.

Step 1: Understand your dashboard metrics

Once your assessment completes, review the key metrics at the top of the dashboard:

  • Total secrets: Total number of secret leaks found across your organization
  • Public leaks: Distinct secrets found in public repositories
  • Preventable leaks: Leaks that push protection could have prevented

You can also determine the number of secrets found in your private repositories by subtracting the number of public leaks from your total secrets. While remediating these secrets is less immediately important, they still pose risk if someone gains unauthorized access to your repositories, or if a repository is made public.

Step 2: Understand secret categories

Look at the Secret categories section to understand what types of secrets were leaked.

  • Provider patterns: Specific secret formats for known services (AWS, Azure, GitHub tokens)
  • Generic patterns: Generic secret formats like private keys, API keys, passwords

Provider patterns are often easier to identify and revoke because you know exactly which service they belong to. Generic patterns may require more investigation.

Step 3: Identify how many repositories are affected

Check the Repositories with leaks metric, which shows how many of your repositories contain secret leaks.

If a high percentage of repositories contain leaks, this may indicate:

  • A widespread culture issue around secret management
  • A need for organization-wide training
  • Missing guardrails like push protection, which blocks secrets before they are committed

If only a few repositories contain leaks, you can:

  • Focus remediation efforts on specific teams
  • Use the leak information to determine which repositories are high-risk areas

Step 4: Review leaked secrets by type

Scroll to the bottom to see the detailed Secret type table, which includes:

  • Secret type: The specific kind of secret
  • Distinct repositories: How many different repositories contain this type
  • Secrets found: Total count of this secret type across all repositories

The table sorts by highest count automatically, helping you identify the greatest risks.

If you see many secrets of the same type (for example, multiple AWS keys), this indicates:

  • Developers may not be using environment variables
  • Missing documentation on secret management

Now that you understand the metrics, prioritize remediation based on risk.

The highest priority secrets are leaked provider patterns in public repositories, because they are:

  • Accessible to anyone on the internet
  • Often easier to identify and revoke, since you know which service they belong to

Next, you can address secrets that present lower risk or require more extensive efforts to remediate. These can be:

  • Generic patterns in public repositories, which may require investigation to identify the service or system they belong to
  • Private repository leaks, that represent a lower immediate risk but should still be addressed

Finally, look for the following indicators, which may require additional prevention efforts beyond leak remediation:

  • Many repositories with leaks: Indicates need for organization-wide training and improved security awareness
  • Repeated secret types: Suggests specific workflows or teams need targeted intervention
  • Common secret categories: May point to particular CI/CD processes requiring security improvements

Next steps

GitHub Secret Protection provides continuous monitoring and push protection to help remediate any remaining secrets and prevent future leaks. To help you evaluate whether GitHub Secret Protection is right for your organization, you can estimate the cost before enabling it. See Estimating the price of Secret Protection.