Auto-Close on Removal #190409
Replies: 2 comments
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
|
I've run into this too. GHAS secret scanning alerts do auto-close when the secret is removed from the default branch's latest commit, but the setting must be enabled. Check your repository settings: This only works on the default branch (usually |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
General
Body
Hi GitHub Team and community,
We have the following scenario: A developer accidentally commits a secret. Upon detection, they move the secret to a Vault and remove the plaintext string from the code in a subsequent commit.
Current behaviour and feature request: GitHub continue to report these as "Open" alerts even after they are no longer present in the current commit? While we understand the secret remains in the Git history, we would like a setting/feature within GHAS to auto-close alerts based on this criteria. This would minimise dashboard noise and expedite the secret remediation process.
Beta Was this translation helpful? Give feedback.
All reactions