Skip to content

Latest commit

 

History

History
29 lines (22 loc) · 973 Bytes

File metadata and controls

29 lines (22 loc) · 973 Bytes

This reusable workflow runs Gitleaks to detect hardcoded secrets in pull requests. It is designed to be called from organization/module repositories via workflow_call.

Usage

Use this workflow when you want a centralized and consistent secret-scanning gate managed from clouddrove/github-shared-workflows.

Highlights

  • ✅ Reusable workflow_call implementation
  • 🔐 Detects leaked credentials/secrets in PR code changes
  • 🧩 Can be consumed by .github policy repos and module repos
  • 🛡️ Uses GITHUB_TOKEN from caller context (secrets: inherit)

Example

name: Gitleaks PR Secret Scan

on:
  pull_request:
  workflow_dispatch:

permissions:
  contents: read

jobs:
  gitleaks:
    uses: clouddrove/github-shared-workflows/.github/workflows/gitleaks-pr-scan.yml@master
    secrets: inherit