Skip to content
Discussion options

You must be logged in to vote

Answer

GitHub doesn’t have a single centralized official doc that explicitly lists which secret source is used for Dependabot-triggered workflows, but the behavior you’ve observed is correct and aligns with the security model.

  • push (from Dependabot)
    Secrets come from the Dependabot secret store (configured under your repository → Settings → Security → Dependabot → Secrets).
    This is intentional to limit scope, since Dependabot runs on your behalf.

  • pull_request_target
    Secrets come from the Actions secret store (configured under repository → Settings → Secrets and variables → Actions).
    This workflow has read/write permissions against the base repository, so normal GitHub Actions secrets …

Replies: 4 comments 1 reply

Comment options

You must be logged in to vote
1 reply
@ppkarwasz
Comment options

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
0 replies
Answer selected by ppkarwasz
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Code Security Build security into your GitHub workflow with features to keep your codebase secure Question Ask and answer questions about GitHub features and usage
4 participants