Allison details GitHub’s latest improvements to secret scanning, including new validators for Microsoft Azure, MongoDB, and Meta, helping DevOps teams better secure their credentials.

GitHub Secret Scanning Adds Validity Checks for Azure, MongoDB, and Meta Credentials

GitHub has expanded its secret scanning capabilities by introducing validity checks for additional secret types, including those from MongoDB, Meta, and Microsoft Azure.

Expanded Secret Types with Validity Checks

The following new secret patterns are now validated:

Provider Pattern Validity
Azure microsoft_ado_personal_access_token
Azure microsoft_azure_apim_repository_key_identifiable
Azure microsoft_azure_maps_key
Azure microsoft_azure_entra_id_token
Meta facebook_very_tiny_encrypted_session
MongoDB mongodb_atlas_db_uri_with_credentials

What Are Validity Checks?

Validity checks help identify if discovered credentials are currently active and exploitable, reducing response times for remediation. If validity checks were previously enabled for a repository, GitHub automatically tests for the new patterns as well.

  • Action Required: No action is needed if validity checks are already enabled—new token types will be checked automatically.
  • For more details and the full list of supported secret patterns, visit the GitHub documentation.

Implications for DevOps and Security Teams

  • Wider Coverage: Teams managing Azure, MongoDB, or Meta integrations gain enhanced protection against credential leaks.
  • Automated Validation: Early notification of active credential leaks accelerates mitigation.
  • Compliance: Supports best practices for application and infrastructure security.

References

This post appeared first on “The GitHub Blog”. Read the entire article here