Secret Scanning Expands Support: 12 New Token Validators Added to GitHub
Allison reports on GitHub’s secret scanning improvements, highlighting expanded support for 12 new token types and enhanced credential validity checks to bolster repository security.
Secret Scanning Expands Support: 12 New Token Validators Added to GitHub
Author: Allison
GitHub has updated its secret scanning feature to add validity check support for 12 new API token types across 11 providers. This improvement enhances repository security and proactive credential management for developers and teams.
Expanded Token Support
GitHub secret scanning can now verify leaked credentials for the following new token types:
- Apify:
apify_api_token
- Asaas:
asaas_api_token
- Cockroach Labs:
ccdb_api_key
- Fullstory:
fullstory_api_key
(legacy and current versions) - Grafana:
grafana_cloud_api_token
- Polar:
polar_access_token
(legacy and current versions) - RunPod:
runpod_api_key
- Sourcegraph:
sourcegraph_instance_identifier_access_token
,sourcegraph_access_token
- Telnyx:
telnyx_api_v2_key
- Val Town:
val_town_api_token
- Yandex:
yandex_cloud_api_key
Validity Checks Explained
A validity check means GitHub automatically verifies whether the leaked credential is active and could still be exploited. With validity checks enabled for a repository, any alert created for these tokens will be validated, reducing the risk of accidental exposure going unaddressed.
Getting Started
To benefit from these additional checks, ensure secret scanning is enabled and that validity checks are active on your repositories. For details and a full list of all supported secret types and patterns, see the GitHub product documentation.
Why This Matters
Expanding validity checking helps development teams:
- Get notified about active, exploitable secrets more precisely
- Reduce manual work validating whether detected secrets are real threats
- Improve the overall security posture of their CI/CD pipelines and repositories
Stay tuned for more updates as GitHub continues to strengthen automated code security tooling.
This post appeared first on “The GitHub Blog”. Read the entire article here