Security
Guide to using the Secret Scanning feature for models, datasets, and code in `Outpost Hub`.
Outpost Hub
incorporates the Gitleaks tool to prevent secrets such as passwords, API keys, and tokens from being pushed to your Git repositories. By enabling secret scanning for your repositories, any commit containing a recognized secret pattern will be blocked, enhancing the security of your codebase.
Important: Secret Scanning in
Outpost
only scans new or modified code in commits pushed after Secret Scanning is enabled. Pre-existing code that remains unchanged will not be scanned for secrets.
Note: Bypassing or ignoring detected secrets should be done cautiously. Only proceed if you are sure the detected secret does not pose a security risk, such as in cases of test data with fake secrets.
To bypass Gitleaks and intentionally commit a detected secret, you have two options:
gitleaks:allow
as a comment in your code..gitleaksignore
file.For further details, refer to the Gitleaks README.