Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

New GitHub Features Help Find Vulnerabilities and Secrets in Code

GitHub on Wednesday announced two new security features designed to help developers identify vulnerabilities and potential secrets in their code.

The company announced several new products at its Satellite virtual conference, including ones aimed at helping customers write and consume more secure code.

GitHub on Wednesday announced two new security features designed to help developers identify vulnerabilities and potential secrets in their code.

The company announced several new products at its Satellite virtual conference, including ones aimed at helping customers write and consume more secure code.

These new security features, code scanning and secret scanning, are currently in beta. GitHub says code scanning helps developers identify potential vulnerabilities in every “git push,” with results being displayed directly in their pull requests.GitHub unveils new security features

The code scanning feature leverages the CodeQL code analysis engine. CodeQL has been offered for free to open source projects as part of an initiative announced by GitHub last year, and the company says the new code scanning feature will be free as well for open source software.

As for secret scanning, the feature allows users to find potentially sensitive data in code, such as tokens, encryption keys and user credentials. The feature has been available for public repositories since 2018 and GitHub has been working with companies such as AWS, Microsoft, Google, Stripe, Twilio and npm to expand coverage. GitHub says secret scanning is now also available for private repositories.

“Code scanning and secret scanning are available for free for all public repositories, and available as part of GitHub Advanced Security,” GitHub said.

GitHub on Wednesday also unveiled Private Instances, an upcoming feature for enterprise customers.

“Private Instances provides enhanced security, compliance, and policy features including bring-your-own-key encryption, backup archiving, and compliance with regional data sovereignty requirements,” the company explained.

Advertisement. Scroll to continue reading.

Related: GitHub Warns Users of Sophisticated Phishing Campaign

Related: GitHub to Warn Users on Compromised Passwords

Related: GitHub Security Alerts Lead to Fewer Vulnerable Code Libraries

Related: GitHub Increases Bug Bounty Program Rewards, Expands Scope

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.