Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

New GitHub Features Help Find Vulnerabilities and Secrets in Code

GitHub on Wednesday announced two new security features designed to help developers identify vulnerabilities and potential secrets in their code.

The company announced several new products at its Satellite virtual conference, including ones aimed at helping customers write and consume more secure code.

GitHub on Wednesday announced two new security features designed to help developers identify vulnerabilities and potential secrets in their code.

The company announced several new products at its Satellite virtual conference, including ones aimed at helping customers write and consume more secure code.

These new security features, code scanning and secret scanning, are currently in beta. GitHub says code scanning helps developers identify potential vulnerabilities in every “git push,” with results being displayed directly in their pull requests.GitHub unveils new security features

The code scanning feature leverages the CodeQL code analysis engine. CodeQL has been offered for free to open source projects as part of an initiative announced by GitHub last year, and the company says the new code scanning feature will be free as well for open source software.

As for secret scanning, the feature allows users to find potentially sensitive data in code, such as tokens, encryption keys and user credentials. The feature has been available for public repositories since 2018 and GitHub has been working with companies such as AWS, Microsoft, Google, Stripe, Twilio and npm to expand coverage. GitHub says secret scanning is now also available for private repositories.

“Code scanning and secret scanning are available for free for all public repositories, and available as part of GitHub Advanced Security,” GitHub said.

GitHub on Wednesday also unveiled Private Instances, an upcoming feature for enterprise customers.

“Private Instances provides enhanced security, compliance, and policy features including bring-your-own-key encryption, backup archiving, and compliance with regional data sovereignty requirements,” the company explained.

Related: GitHub Warns Users of Sophisticated Phishing Campaign

Advertisement. Scroll to continue reading.

Related: GitHub to Warn Users on Compromised Passwords

Related: GitHub Security Alerts Lead to Fewer Vulnerable Code Libraries

Related: GitHub Increases Bug Bounty Program Rewards, Expands Scope

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...