Scan incoming commits for secrets with Talisman.
Find a file
2021-09-19 08:41:26 +02:00
.github/workflows Revert "Add debugging step to test action" 2021-09-19 08:41:26 +02:00
action.yml Make ref args configurable 2021-09-19 08:39:18 +02:00
Dockerfile Try installing git as part of the image 2021-09-18 10:04:00 +02:00
entrypoint.sh Fix talisman invocation 2021-09-18 09:00:57 +02:00
README.md Add readme 2021-09-19 08:25:13 +02:00

Detect secrets with Talisman action

This action uses Talisman to scan the incoming (pushed) range of commits for accidentally added secrets and sensitive information. It mimics a pre-push hook for this, thus it works nicely with a local git hook in tandem, that is as a fallback, last line of defense.

Example usage

uses: carhartl/talisman-secrets-scan-action@v1