How to avoid costs on Secret Protection? #158489
Replies: 20 comments 5 replies
-
|
Verify all repositories were updated successfully: The script you ran might not have successfully updated all repositories Check organization-level settings: Secret scanning might be enabled at the organization level gh api -X PATCH "orgs/$ORG" Check for Advanced Security billing: Navigate to your organization's "Billing and plans" section Billing lag: There might be a delay between disabling the feature and seeing the change reflected in billing Contact GitHub Support: If charges continue after confirming all settings are disabled, reach out to GitHub Support |
Beta Was this translation helpful? Give feedback.
-
|
Thanks @bepoooe for the suggestion. I did apply the same. But, looking at the settings, I can only see these: "advanced_security_enabled_for_new_repositories": false,
"dependabot_alerts_enabled_for_new_repositories": false,
"dependabot_security_updates_enabled_for_new_repositories": false,
"dependency_graph_enabled_for_new_repositories": false,
"secret_scanning_enabled_for_new_repositories": false,
"secret_scanning_push_protection_enabled_for_new_repositories": false,
"secret_scanning_push_protection_custom_link_enabled": false,
"secret_scanning_push_protection_custom_link": null,
"secret_scanning_validity_checks_enabled": falseThe settings in the script provided does not seem to exist. But, I did run it for what it is worth. FYI - I am the owner of this ORG and there is only one member in this ORG. gh api -X PATCH "orgs/$ORG" -f security_and_analysis.secret_scanning.status=disabled -f security_and_analysis.secret_scanning_push_protection.status=disabledI will have to wait for a couple of more days to see if this makes any difference. |
Beta Was this translation helpful? Give feedback.
-
|
Check for Advanced Security billing: Navigate to your organization's "Billing and plans" section Billing lag: There might be a delay between disabling the feature and seeing the change reflected in billing Contact GitHub Support: |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
|
This is not an error or a problem, just an informational message. It means that your organization: There are no repositories with Secret Protection enabled (searching for and protecting secrets in code, such as API tokens). There are no repositories with Code Security enabled (such as Code Scanning, Dependabot, and other GitHub Advanced Security features). Reason: Here's a step-by-step guide on how to enable Secret Protection and Code Security for a repository in GitHub: ✅ 1. Go to the repository ✅ 2. Open the repository settings ✅ 3. Go to the security section pgsql ✅ 4. Enable the desired features 🔒 Secret scanning Click Enable next to this feature. 🛡️ Code scanning Click Set up or Enable. You can configure the GitHub Actions workflow (codeql-analysis.yml is created automatically). 🔁 Dependabot alerts & updates Enable Dependabot alerts and, if necessary, Dependabot security updates. ✅ 5. Commit and complete setup 📌 Result GitHub will start using GitHub Advanced Security licenses. The message This organization has no repositories using ... licenses will disappear. Reports and alerts will start appearing in the Security section of the repository. Here are example files to enable two important GitHub Advanced Security features: 🛡️ 1. CodeQL (Code scanning) 📁 .github/workflows/codeql-analysis.yml yaml on:
jobs: strategy: steps:
🔁 2. Dependabot (dependency updater) 📁 .github/dependabot.yml yaml
package-ecosystem: select the desired dependency system (npm, pip, gradle, etc.). directory: path to the dependency file (/, src/, etc.). After adding these files and committing to main: Code scanning and Dependabot will be active. GitHub will start using Code Security licenses. Reports will appear in the Security → Code scanning alerts and Dependabot section. |
Beta Was this translation helpful? Give feedback.
-
|
🛡️ 1. CodeQL for Node.js and Python yaml on:
jobs: strategy: steps:
yaml
Commit and push to main: bash |
Beta Was this translation helpful? Give feedback.
-
|
Here is an archive with the necessary files to activate CodeQL and Dependabot: |
Beta Was this translation helpful? Give feedback.
-
|
Unzip it to the root of your repository and commit the contents - everything will be ready to run. |
Beta Was this translation helpful? Give feedback.
-
|
Thanks @mscbuild for all the info. But, I just want that secret protection charge to go away. I don't want to enable Secret Protection. I have tried everything that I know of and still getting charged. |
Beta Was this translation helpful? Give feedback.
-
|
It sounds like you're being charged for a Secret Protection feature—possibly from a cloud provider like GitHub, AWS, Azure, or another dev-related service—and you want to stop the charges but can't figure out how to fully disable or remove it. Here's a general step-by-step guide to try and stop the charge: 🔍 1. Identify the Source of the Charge The exact service name (e.g., “GitHub Advanced Security – Secret Scanning”). The provider (e.g., GitHub, AWS, Google Cloud, etc.). The account or organization the charge is tied to. 🔧 2. GitHub Specific – If That’s the Source a. Disable GitHub Advanced Security Under Secret scanning or Advanced Security, disable all checkboxes for each repo. Do this for each repository (there’s no global off-switch yet). b. Downgrade Plan (if needed) Cancel or downgrade any paid plans or features (especially anything related to security scanning or GitHub Advanced Security). 🧾 3. Contact Billing Support GitHub: Submit a billing support ticket AWS: Use the AWS Billing Console and request support Others: Use their respective contact forms Explain that: You do not want to use Secret Protection / Advanced Security. You have disabled all related features. You are still being billed and want the charges removed or refunded. |
Beta Was this translation helpful? Give feedback.
-
|
Thanks @mscbuild .I have already disabled all the security protection related stuff - please refer to the first 2 messages in this discussion. I don't have any automated jobs setup with AWS/GCP, etc. I have raised a support ticket too. Now, I just have to wait for their response. |
Beta Was this translation helpful? Give feedback.
-
|
Unfortunately, you'll have to wait. |
Beta Was this translation helpful? Give feedback.
-
|
Sometimes, a few slip through if the script doesn’t fully complete. Also, check if secret scanning is still enabled at the organization level, as that can override repo settings. If everything’s off and you're still getting charged after a day or two, it's probably worth reaching out to GitHub Support to make sure nothing's being missed on their end. |
Beta Was this translation helpful? Give feedback.
-
|
Hi @shivarammysore! I see that multiple people in the community have chimed in here but haven't been able to answer your question. The best place to go for answers to account-specific questions like this one is opening a ticket on our Support page. Please open a ticket with them :) |
Beta Was this translation helpful? Give feedback.
-
|
thanks @ghostinhershell I have opened a support ticket for the past 2 days. I also wanted to make sure that I have done everything from my side. |
Beta Was this translation helpful? Give feedback.
-
|
🕒 Discussion Activity Reminder 🕒 This Discussion has been labeled as dormant by an automated system for having no activity in the last 60 days. Please consider one the following actions: 1️⃣ Close as Out of Date: If the topic is no longer relevant, close the Discussion as 2️⃣ Provide More Information: Share additional details or context — or let the community know if you've found a solution on your own. 3️⃣ Mark a Reply as Answer: If your question has been answered by a reply, mark the most helpful reply as the solution. Note: This dormant notification will only apply to Discussions with the Thank you for helping bring this Discussion to a resolution! 💬 |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
|
🕒 Discussion Activity Reminder 🕒 This Discussion has been labeled as dormant by an automated system for having no activity in the last 60 days. Please consider one the following actions: 1️⃣ Close as Out of Date: If the topic is no longer relevant, close the Discussion as 2️⃣ Provide More Information: Share additional details or context — or let the community know if you've found a solution on your own. 3️⃣ Mark a Reply as Answer: If your question has been answered by a reply, mark the most helpful reply as the solution. Note: This dormant notification will only apply to Discussions with the Thank you for helping bring this Discussion to a resolution! 💬 |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
|
🕒 Discussion Activity Reminder 🕒 This Discussion has been labeled as dormant by an automated system for having no activity in the last 60 days. Please consider one the following actions: 1️⃣ Close as Out of Date: If the topic is no longer relevant, close the Discussion as 2️⃣ Provide More Information: Share additional details or context — or let the community know if you've found a solution on your own. 3️⃣ Mark a Reply as Answer: If your question has been answered by a reply, mark the most helpful reply as the solution. Note: This dormant notification will only apply to Discussions with the Thank you for helping bring this Discussion to a resolution! 💬 |
Beta Was this translation helpful? Give feedback.



Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Question
Body
I getting charged $0.61 every day for Secret Protection cost. I don't know why and I don't want it. I went over to each of my 70+ repos and disabled secrets. I am not sure what else should I do - but, I want this charge to be gone.
gh api -X PATCH "repos/$ORG/$REPO" \ -f security_and_analysis.secret_scanning.status=disabled \ -f security_and_analysis.secret_scanning_push_protection.status=disabledThanks
Beta Was this translation helpful? Give feedback.
All reactions