Skip to content

Commit 665619f

Browse files
authored
Merge pull request #23953 from github/repo-sync
repo sync
2 parents adabe6d + 6c59715 commit 665619f

File tree

2 files changed

+4
-2
lines changed

2 files changed

+4
-2
lines changed

content/code-security/secret-scanning/secret-scanning-partner-program.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ versions:
1212
ghec: '*'
1313
topics:
1414
- API
15-
shortTitle: Secret scanning
15+
shortTitle: Partner program
1616
---
1717

1818
{% data variables.product.prodname_dotcom %} scans repositories for known secret formats to prevent fraudulent use of credentials that were committed accidentally. {% data variables.product.prodname_secret_scanning_caps %} happens by default on public repositories, and can be enabled on private repositories by repository administrators or organization owners. As a service provider, you can partner with {% data variables.product.prodname_dotcom %} so that your secret formats are included in our {% data variables.product.prodname_secret_scanning %}.

content/code-security/secret-scanning/secret-scanning-patterns.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,9 @@ redirect_from:
2323

2424
{% data variables.product.product_name %} maintains these different sets of {% data variables.product.prodname_secret_scanning %} patterns:
2525

26-
1. **Partner patterns.** Used to detect potential secrets in all public repositories. For details, see "[Supported secrets for partner alerts](#supported-secrets-for-partner-alerts)."
26+
1. **Partner patterns.** Used to detect potential secrets in all public repositories.
27+
- For details, see "[Supported secrets for partner alerts](#supported-secrets-for-partner-alerts)."
28+
- {% data reusables.secret-scanning.partner-program-link %}
2729
2. **User alert patterns.** Used to detect potential secrets in {% ifversion fpt %}public{% endif %} repositories with {% data variables.secret-scanning.user_alerts %} enabled. For details, see "[Supported secrets for user alerts](#supported-secrets-for-user-alerts)."{% ifversion secret-scanning-push-protection %}
2830
3. **Push protection patterns.** Used to detect potential secrets in repositories with {% data variables.product.prodname_secret_scanning %} as a push protection enabled. For details, see "[Supported secrets for push protection](#supported-secrets-for-push-protection)."{% endif %}
2931

0 commit comments

Comments
 (0)