Skip to content

Latest commit

 

History

History
99 lines (64 loc) · 2.69 KB

File metadata and controls

99 lines (64 loc) · 2.69 KB

GitHub Infisical secrets check Action

GitHub repo GitHub last commit GitHub license

CI wakatime

🚨 :octocat: A GitHub action to check and report secret leaks in the repository using Infisical CLI.


Usage

The following workflow step will scan for secret leaks in your repository.

  - name: Run the action
    uses: guibranco/github-infisical-secrets-check-action@latest
    id: secrets-scan

Inputs


Outputs

  • secrets-leaked: The number of secrets leaked found by the Infisical CLI tool.

Example

With default (inherited) GitHub token

name: 'Infisical secrets check'

on:
  pull_request:

  jobs:
    check-secrets:
      runs-on: ubuntu-latest
      permissions:
        contents: read
        pull-requests: write

      steps:
        - uses: actions/checkout@v4
          
        - name: Run the action
          uses: guibranco/github-infisical-secrets-check-action@latest

With a custom GitHub token

name: 'Infisical secrets check'

on:
  pull_request:

  jobs:
    check-secrets:
      runs-on: ubuntu-latest
      permissions:
        contents: read
        pull-requests: write

      steps:
        - uses: actions/checkout@v4
          
        - name: Run the action
          uses: guibranco/github-infisical-secrets-check-action@latest
          with:
            gh_token: ${{ secrets.GH_TOKEN }}

Remember to add the repository secret GH_TOKEN.


Sample output

Success - ✅ No secrets leaked

success

Failure - 🚨 Secrets leaked!

failure