Skip to content

Commit 7b3513d

Browse files
Grey Bakerlucascosti
andauthored
Add Doppler to secret scanning partners (#16682)
Co-authored-by: Lucas Costi <lucascosti@users.noreply.github.com>
1 parent 98e5914 commit 7b3513d

1 file changed

Lines changed: 3 additions & 1 deletion

File tree

content/github/administering-a-repository/about-secret-scanning.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Service providers can partner with {% data variables.product.company_short %} to
2020

2121
{% data variables.product.prodname_secret_scanning_caps %} is automatically enabled on public repositories, where it scans code for secrets, to check for known secret formats. When a match of your secret format is found in a public repository, {% data variables.product.company_short %} doesn't publicly disclose the information as an alert, but instead sends a payload to an HTTP endpoint of your choice. For an overview of how secret scanning works on public repositories, see "[Secret scanning](/developers/overview/secret-scanning)."
2222

23-
When you push to a public repository, {% data variables.product.product_name %} scans the content of the commits for secrets. If you switch a private repository to public, {% data variables.product.product_name %} scans the entire repository for secrets.
23+
When you push to a public repository, {% data variables.product.product_name %} scans the content of the commits for secrets. If you switch a private repository to public, {% data variables.product.product_name %} scans the entire repository for secrets.
2424

2525
When {% data variables.product.prodname_secret_scanning %} detects a set of credentials, we notify the service provider who issued the secret. The service provider validates the credential and then decides whether they should revoke the secret, issue a new secret, or reach out to you directly, which will depend on the associated risks to you or the service provider.
2626

@@ -36,6 +36,7 @@ When {% data variables.product.prodname_secret_scanning %} detects a set of cred
3636
- Databricks
3737
- Datadog
3838
- Discord
39+
- Doppler
3940
- Dropbox
4041
- Dynatrace
4142
- Finicity
@@ -90,6 +91,7 @@ Repository administrators and organization owners can grant users and team acces
9091
- CloudBees CodeShip
9192
- Databricks
9293
- Discord
94+
- Doppler
9395
- Dropbox
9496
- Dynatrace
9597
- Finicity

0 commit comments

Comments
 (0)