On New Push Event on GitHub - Scan for Credentials and Handle Findings
This workflow is triggered by a new push event to a repository on GitHub. It scans committed files for credentials. Storing sensitive credentials in files on GitHub poses a major threat to your security, reputation, and compliance. Confidential information such as passwords, API keys, and private encryption keys can be easily accessed by unauthorized users, leading to data breaches, reputation damage, and possible violations of regulations such as GDPR and PCI DSS. It handles the breach from end to end, asking the committer how to handle the breach: whitelist the credentials and store them encrypted in Blink table, revert the commit and open a pull request for the change or ignore and notify the relevant SecOps personnel.
icon
icon
icon
icon
Breakdown
  1. For each commit, get modified or added files.
  2. For each file, scan for credentials from all types.
  3. If credentials were found, ask the committer how to handle them in Slack.
  4. If the committer chooses to whitelist the credentials, insert them to a table if not already exist.
  5. If the committer chooses to revert the commit, revert, open a pull request, and inform the committer.
  6. If the committer chooses to ignore, inform the relevant personnel.