Skip to content

Commit 563edb3

Browse files
authored
Merge pull request #41396 from github/repo-sync
Repo sync
2 parents c04c593 + 87d6145 commit 563edb3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/code-security/secret-scanning/introduction/supported-secret-scanning-patterns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ If you believe that {% data variables.product.prodname_secret_scanning %} should
3434
This table lists the secrets supported by {% data variables.product.prodname_secret_scanning %}. You can see the types of alert that get generated for each token, as well as whether a validity check is performed on the token.
3535

3636
* **Provider:** Name of the token provider.{% ifversion fpt or ghec %}
37-
* **Partner:** Token for which leaks are reported to the relevant token partner. Applies to public repositories only.
37+
* **Partner:** Token for which leaks are reported to the relevant token partner. Applies to public repositories and all gists, including secret gists. Secret gists are not private and can be accessed by anyone with the URL. See [About gists](/get-started/writing-on-github/editing-and-sharing-content-with-gists/creating-gists#about-gists).
3838
* **User:** Token for which leaks are reported to users on {% data variables.product.prodname_dotcom %}.
3939
* Applies to public repositories, and to private repositories where {% data variables.product.prodname_GH_secret_protection %} and {% data variables.product.prodname_secret_scanning %} are enabled.
4040
* Includes {% ifversion secret-scanning-alert-experimental-list %}default{% else %}high confidence{% endif %} tokens, which relate to supported patterns and specified custom patterns, as well as non-provider tokens such as private keys, which usually have a higher ratio of false positives.

0 commit comments

Comments
 (0)