Skip to main content

Listas de los secretos admitidos y los asociados con los que trabaja GitHub para evitar el uso fraudulento de secretos que se confirmaron por accidente.

¿Quién puede utilizar esta característica?

Secret scanning está disponible para los tipos de repositorio siguientes:

  • Repositorios públicos: Secret scanning se ejecuta automáticamente y sin coste.
  • Repositorios privados e internos de la organización: disponibles con GitHub Secret Protection habilitados en GitHub Team o GitHub Enterprise Cloud.
  • Repositorios propiedad del usuario: disponibles en GitHub Enterprise Cloud con Enterprise Managed Users. Disponible en GitHub Enterprise Server cuando la empresa tiene GitHub Secret Protection habilitado.

About secret scanning patterns

There are three types of secret scanning alerts:

  • User alerts: Reported to users in the Security and quality tab of the repository, when a supported secret is detected in the repository.
  • Push protection alerts: Reported to users in the Security and quality tab of the repository, when a contributor bypasses push protection.
  • Partner alerts: Reported directly to secret providers that are part of secret scanning's partner program. These alerts are not reported in the Security and quality tab of the repository.

For in-depth information about each alert type, see About secret scanning alerts.

If you use the REST API for secret scanning, you can use the Secret type to report on secrets from specific issuers. For more information, see REST API endpoints for secret scanning.

Pattern categories

CategoryDescriptionDetection approachExample
GenericSecrets not tied to a specific provider, such as private keys and database connection stringsRegex-basedrsa_private_key
AI-detectedGeneric passwords detected by Copilot secret scanning using AI modelsAI-basedpassword
ProviderSecrets tied to a specific service provider (such as AWS, Azure, Stripe)Regex-basedaws_access_key_id

Capabilities by category

CapabilityGeneric patternsAI-detectedProvider patterns
User alerts
Partner notifications (if partner)
Push protection (default) (most)
Push protection (configurable)Some
Validity checksSome
Extended metadataSome
Base64 format supportSome

[! NOTE] Validity and extended metadata checks are only available to users with GitHub Team or GitHub Enterprise who enable the feature as part of GitHub Secret Protection.

Supported generic patterns

Precision levels are estimated based on the pattern type's typical false positive rates.

ProviderTokenDescriptionPrecision
Genericec_private_keyElliptic Curve (EC) private keys used for cryptographic operationsHigh
Genericgeneric_private_keyCryptographic private keys with -----BEGIN PRIVATE KEY----- headerHigh
Generichttp_basic_authentication_headerHTTP Basic Authentication credentials in request headersMedium
Generichttp_bearer_authentication_headerHTTP Bearer tokens used for API authenticationMedium
Genericmongodb_connection_stringConnection strings for MongoDB databases containing credentialsHigh
Genericmysql_connection_urlConnection strings for MySQL databases containing credentialsHigh
Genericopenssh_private_keyOpenSSH format private keys used for SSH authenticationHigh
Genericpgp_private_keyPGP (Pretty Good Privacy) private keys used for encryption and signingHigh
Genericpostgres_connection_stringConnection strings for PostgreSQL databases containing credentialsHigh
Genericrsa_private_keyRSA private keys used for cryptographic operationsHigh

Nota:

Validity checks are not supported for generic/ non-provider patterns.

Supported AI-detected patterns

Secret scanning uses Copilot to detect generic passwords. See Responsible detection of generic secrets with Copilot secret scanning.

ProviderToken
Genericpassword

Nota:

Push protection and validity checks are not supported for passwords.

Supported provider patterns

Use the table below to search, filter, and browse all supported patterns. You can filter by provider name, push protection support, validity checks, and more.

Nota:

Service providers update the patterns used to generate tokens periodically and may support more than one version of a token. Push protection only supports the most recent token versions that secret scanning can identify with confidence. This avoids push protection blocking commits unnecessarily when a result may be a false positive, which is more likely to happen with legacy tokens.

Showing 517 of 517 patterns

Supported patterns

SecretPartnerUser alertPush protectionValidity checkMetadata checkBase64
1Password
1Password Service Account Token

1password_service_account_token

Adafruit
Adafruit IO Key

adafruit_io_key

Adobe
Adobe Client Secret

adobe_client_secret

Adobe
Adobe Device Token

adobe_device_token

Adobe
Adobe PAC Token

adobe_pac_token

Adobe
Adobe Refresh Token

adobe_refresh_token

Adobe
Adobe Service Token

adobe_service_token

Adobe
Adobe Short-Lived Access Token

adobe_short_lived_access_token

Aikido
Aikido API Client Secret

aikido_api_client_secret

Aikido
Aikido CI Scanning Token

aikido_ci_scanning_token

Airtable
Airtable API Key

airtable_api_key

Airtable
Airtable Personal Access Token

airtable_personal_access_token

Aiven
Aiven Auth Token

aiven_auth_token

Aiven
Aiven Service Password

aiven_service_password

Alibaba
Alibaba Cloud AccessKey ID

alibaba_cloud_access_key_id, alibaba_cloud_access_key_secret

Amazon AWS
Amazon AWS Access Key ID

aws_access_key_id, aws_secret_access_key, Token versions

Amazon AWS
Amazon AWS API Key ID

aws_api_key

Amazon AWS
Amazon AWS Session Token

aws_secret_access_key, aws_session_token, aws_temporary_access_key_id

Anthropic
Anthropic Admin API Key

anthropic_admin_api_key

Anthropic
Anthropic API Key

anthropic_api_key, Token versions

Anthropic
Anthropic Session ID

anthropic_session_id

Apify
Apify Actor Run API Token

apify_actor_run_api_token

Apify
Apify Actor Run Proxy Password

apify_actor_run_proxy_password

Apify
Apify API Token

apify_api_token

Apify
Apify Integration API Token

apify_integration_api_token