Secret scanning's delegated bypass controls for push protection (public beta) - feedback #121816
Replies: 6 comments 11 replies
-
We've deployed this internally and it's working great. I have a couple requests though!
Thanks! |
Beta Was this translation helpful? Give feedback.
-
Hi, @courtneycl! The delegated bypass feature is one we're planning to rely on as a key control to keep provider secrets out of our GitHub environment, so we're very excited about it. That said, our testing has uncovered some problems. Using the CLI, I was able to use a non-privileged account (i.e. a non-org-owner, non-security-managers account) to bypass push protection and commit a GitHub PAT to a repo in one of our orgs that has the delegated bypass turned on. Then, two of my colleagues were able to use the web UI to push an azure ad application key (push protection itself didn't even work on this one) and a hashi key (where delegated bypass didn't work). Have others reported similar concerns? Happy to get on a call with your team sometime to demo what we're seeing. Thank you! |
Beta Was this translation helpful? Give feedback.
-
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
Hello @courtneycl, I don't know if it was this specific release item, or one of the others listed in the changelog for July 8th, but, I suspect based on the timing, that one of the items for July 8th caused a regression for the Gist QuickSearch Input field. I've documented what I know about this here: For a little more context:
I know releases can be a bit chaotic, but, I suspect that those that rely "Heavily" on Gist search functionality (i.e. Gists are my personal Notion), might be in a bit of disarray at the moment due to this regression. If it's a feature (I can't see how it would be), it certainly wasn't listed in the changelog. I should also note that, it seems that when logged out, the QuickSearch functions as it always has. When logged in, this is where the potential regression can be noticed. Also, attempts to log out from the Gist screen, seem to do nothing, while, logging out from main github.com, does do what it is expected to do. I'll also take this opportunity to ask, is gist.github.com being deprecated or, it is just a lack of resources with eyes on that sub-domain ATM? |
Beta Was this translation helpful? Give feedback.
-
Did this release have any undocumented changes to branch protection defaults? This broke "all of a sudden" Between Friday and Yesterday. Looks like it is because Do not allow bypassing the above settings is now enabled by default and allow force pushes is now needed to allow automation to sync repositories. |
Beta Was this translation helpful? Give feedback.
-
When you need a exception because of test-code etc it needs to be handled promptly -- preferably within 15 minutes. |
Beta Was this translation helpful? Give feedback.
-
GitHub Advanced Security customers using secret scanning can now specify which teams or roles have the ability to bypass push protection. This is intended to help reduce bypass rates within organizations that see high levels of live secrets being bypassed and committed into repositories.
This is managed through a new bypass list, where organizations can select which teams or roles are authorized to bypass push protection and act as reviewers for bypass requests. If an individual not included in this list needs to push a commit that is initially blocked, they must submit a bypass request. This request is then reviewed by an authorized individual who can either approve or deny it, determining whether the commit can proceed into the repository.
🗣️ We're looking for your feedback as we're in beta, both from the reviewer side and from the requestor side.
Things like:
Thank you very much -- we appreciate you ❤️
Learn more about secret scanning | Learn more about push protection
Beta Was this translation helpful? Give feedback.
All reactions