What is a secret?
In software development, a secret is a piece of sensitive information that is used to authenticate or authorize access to systems, services, data, and APIs. Examples include:
- API keys and access tokens that allow you to interact with external services such as GitHub's REST API. Access tokens also allow services, such as GitHub Actions, to perform tasks that need authentication, as we will experiment with later.
- Database credentials that grant access to local and external databases and storage.
- Private keys, such as private SSH and PGP keys, that can be used to access other servers and encrypt data.
Since secrets provide so much access, including to critical systems, we can understand why it's so important to keep your secrets secure.
What can happen when a secret is exposed?
- Attackers can gain unauthorized access to everything the secret allows access to.
- Hackers can steal data, including sensitive user data. This may have privacy and legal ramifications and harm trust in you and your application.
- Exposed secrets can cost you money if hackers run unauthorized workloads on your cloud provider accounts.
- Hackers can use an exposed secret to delete, modify, and disrupt servers which can cause downtime and data loss.
Consider all the access and abilities a secret grants you and what a hacker could do with it. For example, if a personal access token for your GitHub account was exposed, a hacker could post and make changes on GitHub as you.
Best practices for managing your secrets
To avoid these types of issues, follow best practices to prevent leaks and limit damage if a secret is ever exposed.
Follow the Principle of Least Privilege (PoLP)
Whenever possible, restrict what a secret can do and can access to only what is necessary. For example:
- If a secret will only be used to read data and not make changes to data, opt to make it read only.
- If the API you're using allows you to limit a secret to only particular scopes or permissions, only select the ones that you need. For example, if you only need to create issues with a GitHub secret, there's no reason for the secret to have access to repository contents or anything else.
- If a secret will give an attacker full access to the user account that owns it, consider creating service accounts that can take ownership of the secret.
Protect secrets in your application
- Never hardcode a secret. Always use environment variables or your platform's secret management tools (such as GitHub's repository secrets).
- If you have to share a secret with someone, use a dedicated tool like a password manager. Never send secrets via email or instant message.
- If possible, set expiration dates and rotate your secrets regularly; this reduces the risk of old secrets being exploited.
- If your application produces a log, ensure that secrets are redacted before being logged. Otherwise, active secrets could be saved to plaintext files.
Limit damage if a secret is exposed
- Consider the secret compromised, even if only exposed for a second, and revoke the secret immediately. Then, generate a new secret and store it safely.
- Check any activity logs that might show any suspicious activity performed with the compromised secret.
- Consider how the secret was exposed and make changes to your processes so this can't happen again.
How GitHub helps keep your secrets secure
There's a lot that you can do to keep your secrets safe, but there's also a lot that GitHub does to help keep your secrets secret. Everyone makes mistakes, and we're here to help with features that will catch any secrets you accidentally expose:
- Push protection, which we'll experiment with later, blocks pushing secrets to your repositories on GitHub.
- Secret scanning scans repositories and creates alerts when it discovers a secret. For some secrets, we also notify the provider so they can take action, such as revoking the secret automatically.
Practicing safely storing a secret
In this exercise, we'll create a personal access token and store it safely so we can use it with GitHub Actions. The action we'll create is a straightforward workflow that responds to an issue.
1. Creating a practice repository
We'll start by creating a repository to work from. The new2code
account has a template repository we can use to quickly get started.
- Navigate to the new repository page. Following this link will pre-select the template on the
new2code
account. - Under "Owner", make sure your user account is selected.
- In the "Repository name" field, type
secret-action
. - Beneath the description field, select Public to set the repository visibility.
- Click Create repository.
2. Committing a dummy token
Everyone makes mistakes, and it's possible that you'll accidentally commit a secret at some point in your coding journey. In this exercise, we'll intentionally commit a fake token so that we can become familiar and comfortable with the alert that gets triggered.
-
Navigate to the repository you just created.
-
Navigate to the YAML workflow file by clicking
.github/workflows
in the list of files. -
Open the workflow file by clicking
comment.yml
in the list of files. -
To edit the workflow file, at the top-right, click .
-
On line 13,
GH_TOKEN: ""
, insert this dummy token between the quotes:secret_scanning_ab85fc6f8d7638cf1c11da812da308d43_abcde
The end result should look like this:
GH_TOKEN: "secret_scanning_ab85fc6f8d7638cf1c11da812da308d43_abcde"
-
To attempt to commit the change, at the top right, click Commit changes... and then click Commit changes again in the dialog.
-
You should now see the push protection alert, telling you that "Secret scanning found a GitHub Secret Scanning secret on line 13".
If we weren't experimenting with a dummy token, this would alert us that we were one step away from exposing a token. Review the options you can select on the alert.
-
To stop your commit and avoid exposing the secret, click Cancel. In the top right, click Cancel changes, then discard your unsaved changes if prompted.
3. Creating a real token
Now, let's try following our best practices. First, we'll create a personal access token which will allow the action to act on your behalf (the comment it creates will appear to come from your user account).
Note
Notice how we follow the Principle of Least Privilege for each configuration step. Your token will have the shortest expiration necessary, only have access to the repository it needs, and have the minimum permissions needed to work.
- Navigate to the new personal access token page.
- Under "Token name", give your new token a name. You can use something like "Action token".
- Under "Expiration", select "7 days".
- Under "Repository access", select Only select repositories.
- In the "Select repositories" dropdown, select just the practice repository you created earlier.
- To the right of "Repository permissions" in the "Permissions" section, click to view all the possible permissions.
- Scroll down to "Issues" and, in the dropdown on the right, select "Read and write".
- At the bottom of the page, click Generate token. If prompted, confirm by clicking Generate token again.
It's crucial to handle the resulting token securely from this moment forward. As we'll be using the token shortly, you can copy it to your clipboard briefly.
4. Storing the token safely
We can now store our new token safely in our repository.
-
Navigate to the repository you created at the beginning of the exercise.
-
Sous le nom de votre dépôt, cliquez sur Paramètres. Si vous ne voyez pas l’onglet « Paramètres », sélectionnez le menu déroulant , puis cliquez sur Paramètres.
-
Dans la section Sécurité de la barre latérale, sélectionnez Secrets et variables, puis cliquez sur Actions.
-
Under "Repository secrets," click New repository secret.
-
In the Name field, type the name for your secret. For this exercise, we'll use
MY_TOKEN
. -
In the Secret field, paste the personal access token you generated previously.
-
Click Add secret.
Your secret is now safely encrypted and ready to use!
5. Referencing the token in our action
Now we can update the YAML workflow file to use the token and test it works.
-
Navigate back to your repository. If you're in your repository's settings, you can click Code under the repository name.
-
Navigate to the YAML workflow file by clicking
.github/workflows
in the list of files. -
Open the workflow file by clicking
comment.yml
in the list of files. -
To start editing the workflow file, at the top-right, click .
-
On line 13,
GH_TOKEN: ""
, replace the empty quotes with${{ secrets.MY_TOKEN }}
. This will reference the repository secret we added previously.GH_TOKEN: ${{ secrets.MY_TOKEN }}
-
To commit the change, at the top-right, click Commit changes...
-
In the "Commit changes" dialog, edit "Commit message" to reflect the change we're making. For example, you could enter "Updating workflow to use repository secret".
-
Make sure "Commit directly to the
main
branch" is selected. -
Click Commit changes.
6. Testing out the token and workflow
We should be all set now! Let's go ahead and test the workflow.
-
Sous le nom de votre référentiel, cliquez sur Problèmes.
-
Cliquez sur Nouveau problème.
-
Under "Add a title", you can type any title you like.
-
Under "Add a description", in the text area, type
Hello
. -
Beneath the text area, click Create.
Once the workflow has had time to complete, you should see a new comment appear. The comment will be authored by yourself, as we're using your token, and contain a greeting in return.
Next steps
For a more in-depth dive into secret scanning and push protection, you can complete the Introduction to secret scanning course in GitHub Skills.