To exclude specific files or directories from being scanned by secret scanning in GitHub Actions, you can use the paths-ignore: key within your YAML workflow file.
This tells GitHub to ignore specified paths when scanning for secrets, which can be useful for excluding test data or non-sensitive mock content.
Other options listed are invalid:
branches-ignore: excludes branches, not files.
decrypt_secret.sh is not a YAML key.
secret scanning.yml is not a recognized filename for configuration.
[: GitHub Docs – Ignoring Files in GitHub Actions for Secret Scanning, , ]
Questions # 22:
You are managing code scanning alerts for your repository. You receive an alert highlighting a problem with data flow. What do you click for additional context on the alert?
When dealing with a data flow issue in a code scanning alert, clicking on "Show paths" provides a detailed view of the data's journey through the code. This includes the source of the data, the path it takes, and where it ends up (the sink). This information is crucial for understanding how untrusted data might reach sensitive parts of your application and helps in identifying where to implement proper validation or sanitization.
[: GitHub Docs – Assessing code scanning alerts for your repositoryGitHub Docs+1GitHub Docs+1, , ]