GitHub secret scanning continually updates its detectors, validators, and analyzers. Here’s what’s new.

  • Nine new secret detectors from seven providers, including Langchain, Salesforce, and Figma.
  • Secrets from Figma, Google, OpenVSX, and PostHog are now push-protected by default.
  • Validity checks are now supported for npm secrets (npm_access_token).

Missed our last update? Catch up on recently added detectors or see the full list of supported secrets in our product documentation.

Detectors added

Secret scanning now automatically detects the following new secret types in your repositories.

Provider Secret type Partner User Push protection
Fieldguide fieldguide_api_token (configurable)
Figma figma_scim_token ✓ (default)
Flickr flickr_api_key (configurable)
Hack Club hackclub_ai_api_key (configurable)
Langchain langsmith_license_key ✓ (default)
Langchain langsmith_scim_bearer_token ✓ (default)
PostHog posthog_oauth_access_token (configurable)
PostHog posthog_oauth_refresh_token (configurable)
Salesforce salesforce_marketing_cloud_api_oauth2_token ✓ (default)

Detectors for Drone CI, Netlify, Pydantic, and Twitch are currently in observation mode and will be promoted to general availability after validation. Keep an eye on the GitHub changelog for updates.

Partner secrets are automatically reported to the secret issuer when found in public repositories through the secret scanning partnership program. Learn more about the technical partnership program for secret scanning.

User secrets generate secret scanning alerts when found in public or private repositories. Learn more in our documentation about secret scanning.

Validators added

The following secret types now support validity checks, which automatically verify whether a detected secret is still active to help prioritize remediation.

Provider Secret type
npm npm_access_token

Push protection defaults

The following existing detectors are now included in push protection by default. When push protection is enabled, these patterns will block commits containing matching secrets.

Provider Secret type
Figma figma_scim_token
Google google_gcp_api_key_bound_service_account
OpenVSX openvsx_access_token
PostHog posthog_personal_api_key

Secret types that are included in push protection by default apply for all repositories with secret scanning enabled, including for free public repositories. Patterns marked as configurable are available for GitHub secret scanning customers to enable in their push protection settings. Learn more in our documentation about push protection.

Push protection configurability

GitHub is constantly improving the user experience for secret scanning features based on your feedback. Starting today, pattern type names in the push protection pattern configurations UI will link back to a filtered alert list view for that type.

Have more feedback? Let us know by joining the discussion in GitHub Community.

Learn more

Learn more about secret scanning and see the full list of supported secrets in our product documentation.