{"meta":{"title":"Secret security","intro":"Learn about secret scanning patterns, risk report CSV contents, and GitHub secrets.","product":"Security and code quality","breadcrumbs":[{"href":"/en/enterprise-server@3.20/code-security","title":"Security and code quality"},{"href":"/en/enterprise-server@3.20/code-security/reference","title":"Reference"},{"href":"/en/enterprise-server@3.20/code-security/reference/secret-security","title":"Secret security"}],"documentType":"subcategory"},"body":"# Secret security\n\nLearn about secret scanning patterns, risk report CSV contents, and GitHub secrets.\n\n## Links\n\n* [Understanding GitHub secret types](/en/enterprise-server@3.20/code-security/reference/secret-security/understanding-github-secret-types)\n\n  Learn about the usage, scope, and access permissions for GitHub secrets.\n\n* [Supported secret scanning patterns](/en/enterprise-server@3.20/code-security/reference/secret-security/supported-secret-scanning-patterns)\n\n  Lists of supported secrets and the partners that GitHub works with to prevent fraudulent use of secrets that were committed accidentally.\n\n* [Secret scanning detection scope](/en/enterprise-server@3.20/code-security/reference/secret-security/secret-scanning-detection-scope)\n\n  Secret scanning uses pattern matching and validation to detect secrets. Detection varies based on pattern pairs, token types, and push protection settings.\n\n* [Custom patterns reference](/en/enterprise-server@3.20/code-security/reference/secret-security/custom-patterns)\n\n  Use specific regular expression syntax to define accurate custom patterns for secret scanning.\n\n* [Contents of the secret risk assessment report CSV](/en/enterprise-server@3.20/code-security/reference/secret-security/risk-report-csv-contents)\n\n  Understand the data included in the CSV export of the secret risk assessment report.\n\n* [Secret scanning pattern configuration data](/en/enterprise-server@3.20/code-security/reference/secret-security/secret-scanning-pattern-configuration-data)\n\n  Understand the data displayed in the secret scanning pattern configuration page to make informed decisions about push protection settings."}