From e9923b734b9e947ab68178bf2926d60ed3619984 Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Sun, 25 Jan 2026 08:24:50 -0800 Subject: [PATCH 1/3] Sync secret scanning data (#59327) Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- .../data/pattern-docs/fpt/public-docs.yml | 18 +++++++++--------- .../data/pattern-docs/ghec/public-docs.yml | 18 +++++++++--------- 2 files changed, 18 insertions(+), 18 deletions(-) diff --git a/src/secret-scanning/data/pattern-docs/fpt/public-docs.yml b/src/secret-scanning/data/pattern-docs/fpt/public-docs.yml index 13d6eec9b726..629b86e1e061 100644 --- a/src/secret-scanning/data/pattern-docs/fpt/public-docs.yml +++ b/src/secret-scanning/data/pattern-docs/fpt/public-docs.yml @@ -93,7 +93,7 @@ secretType: airtable_api_key isPublic: false isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -147,7 +147,7 @@ secretType: aws_api_key isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -1060,7 +1060,7 @@ secretType: block_protocol_api_key isPublic: false isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: true base64Supported: false isduplicate: false @@ -1321,7 +1321,7 @@ secretType: cohere_api_key isPublic: false isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -1474,7 +1474,7 @@ secretType: databricks_scoped_internal_token isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -1492,7 +1492,7 @@ secretType: databricks_workspace_session_token isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -2495,7 +2495,7 @@ secretType: limbar_token isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -2846,7 +2846,7 @@ secretType: netflix_netkey isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -3458,7 +3458,7 @@ secretType: rainforest_sandbox_api_key isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false diff --git a/src/secret-scanning/data/pattern-docs/ghec/public-docs.yml b/src/secret-scanning/data/pattern-docs/ghec/public-docs.yml index 13d6eec9b726..629b86e1e061 100644 --- a/src/secret-scanning/data/pattern-docs/ghec/public-docs.yml +++ b/src/secret-scanning/data/pattern-docs/ghec/public-docs.yml @@ -93,7 +93,7 @@ secretType: airtable_api_key isPublic: false isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -147,7 +147,7 @@ secretType: aws_api_key isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -1060,7 +1060,7 @@ secretType: block_protocol_api_key isPublic: false isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: true base64Supported: false isduplicate: false @@ -1321,7 +1321,7 @@ secretType: cohere_api_key isPublic: false isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -1474,7 +1474,7 @@ secretType: databricks_scoped_internal_token isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -1492,7 +1492,7 @@ secretType: databricks_workspace_session_token isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -2495,7 +2495,7 @@ secretType: limbar_token isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -2846,7 +2846,7 @@ secretType: netflix_netkey isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false @@ -3458,7 +3458,7 @@ secretType: rainforest_sandbox_api_key isPublic: true isPrivateWithGhas: true - hasPushProtection: false + hasPushProtection: true hasValidityCheck: false base64Supported: false isduplicate: false From e44c72d93ff41be4bff91d33eb8054341981b159 Mon Sep 17 00:00:00 2001 From: Sam Browning <106113886+sabrowning1@users.noreply.github.com> Date: Sun, 25 Jan 2026 11:52:14 -0500 Subject: [PATCH 2/3] [EDI] Remediating a leaked secret in your repository (#59313) Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- .../remediate-leaked-secrets/remediating-a-leaked-secret.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/code-security/tutorials/remediate-leaked-secrets/remediating-a-leaked-secret.md b/content/code-security/tutorials/remediate-leaked-secrets/remediating-a-leaked-secret.md index 9cc81e0cf0d9..2c8d9650d3b5 100644 --- a/content/code-security/tutorials/remediate-leaked-secrets/remediating-a-leaked-secret.md +++ b/content/code-security/tutorials/remediate-leaked-secrets/remediating-a-leaked-secret.md @@ -23,7 +23,7 @@ Secrets, such as API keys, tokens and credentials, can pose significant security You should consider any leaked secret to be immediately compromised and it is essential that you undertake proper remediation steps, such as revoking the secret. Simply removing the secret from the codebase, pushing a new commit, or deleting and recreating the repository do not prevent the secret from being exploited. -This how-to walks you through what to do if you've accidentally committed a secret to your repository, or if you've been alerted to a secret leak in your repository. +This tutorial walks you through what to do if you've accidentally committed a secret to your repository, or if you've been alerted to a secret leak in your repository. ### Prerequisites From 7cb179b7906d2c09a0136a529c80007ff2d92081 Mon Sep 17 00:00:00 2001 From: Copilot <198982749+Copilot@users.noreply.github.com> Date: Sun, 25 Jan 2026 16:54:31 +0000 Subject: [PATCH 3/3] Docs: mention Gradle Wrapper file for Dependabot Gradle updates (#59318) Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: kbukum1 <171620528+kbukum1@users.noreply.github.com> Co-authored-by: kbukum1 Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- data/reusables/dependabot/supported-package-managers.md | 1 + 1 file changed, 1 insertion(+) diff --git a/data/reusables/dependabot/supported-package-managers.md b/data/reusables/dependabot/supported-package-managers.md index 4ff7b8f9ae32..4da4a7de5688 100644 --- a/data/reusables/dependabot/supported-package-managers.md +++ b/data/reusables/dependabot/supported-package-managers.md @@ -124,6 +124,7 @@ For more information about using {% data variables.product.prodname_dependabot_v * `build.gradle`, `build.gradle.kts` (for Kotlin projects) * `gradle/libs.versions.toml` (for projects using a standard Gradle version catalog) * `gradle.lockfile` (for projects using Gradle dependency locking) +* `gradle/wrapper/gradle-wrapper.properties` (for the Gradle Wrapper) * Files included via the `apply` declaration that have `dependencies` in the filename. Note that `apply` does not support `apply to`, recursion, or advanced syntaxes (for example, Kotlin's `apply` with `mapOf`, filenames defined by property). {% data variables.product.prodname_dependabot %} uses information from the `pom.xml` file of dependencies to add links to release information in update pull requests. If the information is omitted from the `pom.xml` file, then it cannot be included in {% data variables.product.prodname_dependabot %} pull requests, see [AUTOTITLE](/code-security/dependabot/ecosystems-supported-by-dependabot/optimizing-java-packages-dependabot).