Skip to main content

Como trabalhar com a proteção de push e o servidor de MCP do GitHub

Saiba como ter proteção contra vazamento de segredos durante as interações com o servidor de MCP do GitHub e como ignorar um bloqueio de proteção de push, se necessário.

Quem pode usar esse recurso?

Usuários com com acesso para gravação

Public repositories on GitHub.com

About push protection and the GitHub MCP server

Push protection prevents you from inadvertently exposing secrets, such as tokens, keys and credentials, in your repository.

When you're interacting with the GitHub MCP server, push protection blocks secrets in AI-generated responses as well as preventing secrets from being included in any actions you perform, such as creating an issue.

This protection is on by default for all interactions between the GitHub MCP server and public repositories; and between the GitHub MCP server and private repositories covered by GitHub Advanced Security, regardless of whether push protection is enabled on the repository's security settings page.

Resolving a block

To resolve the block, you can either:

  • Remove the secret from the content of your request before trying again.
  • Bypass the block. If push protection is enabled for the repository, or you have push protection enabled for your personal account, you'll see an option to bypass the push protection block. You should carefully evaluate if it's safe to include the secret in your request before continuing.

Further reading