All Security Checks
Infrastructure CheckA08:2021

GitHub Repository Security Scanner

Scan your GitHub repository for leaked secrets, misconfigured Actions, and supply chain risks.

Your GitHub repository can expose sensitive information through commit history, misconfigured Actions workflows, and dependency vulnerabilities. Our scanner checks for leaked secrets in code and commit history, analyzes GitHub Actions for security misconfigurations, reviews branch protection rules, and identifies supply chain risks in your dependency graph.

What This Scanner Does

Scans repository contents and commit history for API keys, passwords, and secrets. Analyzes GitHub Actions workflows for injection vulnerabilities, unsafe third-party actions, and excessive permissions. Checks branch protection rules, Dependabot alerts, and code scanning configuration.

Why It Matters

GitHub repositories are the most common source of leaked API keys and credentials. Once pushed, secrets remain in git history even after deletion. Misconfigured GitHub Actions can be exploited to steal secrets, inject malicious code, or compromise your CI/CD pipeline.

Common Findings

  • API keys or passwords committed to repository
  • GitHub Actions workflow with script injection risk
  • Third-party Actions pinned to mutable tags instead of SHA
  • Branch protection not enforced on main branch
  • Dependabot alerts unresolved for critical vulnerabilities
  • CODEOWNERS file missing for sensitive paths

OWASP Top 10 Coverage

A08:2021Software & Data Integrity Failures

Run This Check on Your Site

Get a full security report with AI-powered fix suggestions in 30 seconds. No setup required.

Related Security Checks