Detect secrets with Talisman
ActionsScan an incoming range of commits for accidentally added secrets and sensitive information
v1.2.1
By carhartl
Tags
(2)This action uses Talisman to scan the incoming (pushed) range of commits for accidentally added secrets and sensitive information. It mimics a pre-push hook for this, thus it works nicely with a local git hook in tandem, that is as a fallback, last line of defense.
steps:
- name: Detect secrets with Talisman in incoming commits
uses: carhartl/[email protected]
When using this along with the actions/checkout@v2
step you'll need to configure it to avoid a too shallow clone:
- uses: actions/checkout@v2
with:
fetch-depth: 0
Otherwise you may run into Talisman erroring out while it's trying to execute git with an invalid revision range:
time="2021-09-19T07:07:32Z" level=fatal msg="Git command execution failed" command="git diff 0c4a631e70056a95df1c235d238a80828e07cf9c..a32a5c7e1a3d250bf18a080a44a764d9b93b9690 --name-only --diff-filter=ACM" dir=/github/workspace error="exit status 128" output="fatal: Invalid revision range 0c4a631e70056a95df1c235d238a80828e07cf9c..a32a5c7e1a3d250bf18a080a44a764d9b93b9690\n"
Detect secrets with Talisman is not certified by GitHub. It is provided by a third-party and is governed by separate terms of service, privacy policy, and support documentation.