Conversation
Adds the required `secret-scan` job per the push-protection standard (petry-projects/.github/standards/push-protection.md#required-ci-job). - Uses `gitleaks/gitleaks-action@ff98106e4c7b2bc287b24eaf42907196329070c7` (v2.3.9) — compliance audit checks for `uses: gitleaks/gitleaks-action@` pattern - SHA-pinned per Action Pinning Policy (ci-standards.md) - `fetch-depth: 0` to scan full git history - `--redact` to prevent leaked values appearing in workflow logs - `--exit-code 1` to fail the build on any finding - Adds `.gitleaksignore` with fingerprints for 7 confirmed false-positive findings in commit 865de69 (documentation paths containing "api-key") Closes #96 Co-authored-by: don-petry <don-petry@users.noreply.github.com>
|
Warning Rate limit exceeded
Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 13 minutes and 47 seconds. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Path: .coderabbit.yaml Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (2)
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
gitleaks-action v2 requires GITLEAKS_LICENSE for organization repos. Add it as a secret reference so the job passes once the secret is configured at org or repo level. Co-authored-by: don-petry <don-petry@users.noreply.github.com>
|
CI Status: Action RequiredThe What's neededSet the
What this PR does
Once |
There was a problem hiding this comment.
Pull request overview
Adds a required CI secret-scanning job to bring the repository in line with the org push-protection standard and suppresses known historical false positives.
Changes:
- Added a new
secret-scanjob in CI using SHA-pinnedgitleaks/gitleaks-actionand full-history checkout. - Added
.gitleaksignoreentries to suppress 7 reviewed false positives from a historical commit.
Reviewed changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated 1 comment.
| File | Description |
|---|---|
.github/workflows/ci.yml |
Introduces the secret-scan job running gitleaks in CI (full history, fail on findings). |
.gitleaksignore |
Adds fingerprints to ignore known false-positive matches in historical content. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| fetch-depth: 0 | ||
|
|
||
| - name: Run gitleaks | ||
| # Pinned to SHA per Action Pinning Policy (ci-standards.md#action-pinning-policy). |
There was a problem hiding this comment.
The inline doc reference ci-standards.md#action-pinning-policy is not resolvable within this repo (there is no ci-standards.md here). To avoid broken/ambiguous guidance, point this comment at the actual source (e.g., a full URL to petry-projects/.github/.../ci-standards.md#action-pinning-policy or a local doc path that exists).
| # Pinned to SHA per Action Pinning Policy (ci-standards.md#action-pinning-policy). | |
| # Pinned to SHA per Action Pinning Policy | |
| # (https://github.com/petry-projects/.github/blob/main/ci-standards.md#action-pinning-policy). |
|
Auto-rebase blocked — the base branch contains Please rebase this branch manually: |



Summary
secret-scanjob toci.ymlper the push-protection standardgitleaks/gitleaks-action@ff98106e4c7b2bc287b24eaf42907196329070c7(v2.3.9), SHA-pinned per Action Pinning Policyfetch-depth: 0to scan full git history;--redactto keep secrets out of logs;--exit-code 1to fail the build on findings.gitleaksignorewith fingerprints for 7 confirmed false-positive findings in historical commit865de69b(documentation paths containing "api-key" substring, not real credentials)Why previous PRs did not close the issue
uses: gitleaks/gitleaks-action@gitleaks-actionbut wasn't merged before the next compliance audit ranTest plan
secret-scanjob passes (gitleaks finds no real secrets).gitleaksignoresuppresses the 7 known false positives from commit865de69bsecret_scan_ci_job_presentpasses on next runCloses #96
Generated with Claude Code