[daily secrets] Daily Secrets Analysis Report — 2026-02-19 #16904
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-02-22T20:06:34.761Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Overview
Scanned 153 compiled workflow files (
.lock.yml) on February 19, 2026. Found 3,259secrets.*references and 392github.tokenreferences across 23 unique secret types. The security posture is excellent — all 153 workflows have redaction steps and explicit permission blocks in place.Key Metrics
secrets.*Referencesgithub.tokenReferencesTop 10 Secrets by Usage
GITHUB_TOKENGH_AW_GITHUB_TOKENGH_AW_GITHUB_MCP_SERVER_TOKENCOPILOT_GITHUB_TOKENANTHROPIC_API_KEYOPENAI_API_KEYCODEX_API_KEYTAVILY_API_KEYNOTION_API_TOKENGH_AW_PROJECT_GITHUB_TOKENView All Secret Types (23 total)
GITHUB_TOKENGH_AW_GITHUB_TOKENGH_AW_GITHUB_MCP_SERVER_TOKENCOPILOT_GITHUB_TOKENANTHROPIC_API_KEYOPENAI_API_KEYCODEX_API_KEYTAVILY_API_KEYNOTION_API_TOKENGH_AW_PROJECT_GITHUB_TOKENGH_AW_AGENT_TOKENBRAVE_API_KEYDD_SITEDD_APPLICATION_KEYDD_API_KEYSENTRY_OPENAI_API_KEYSENTRY_ACCESS_TOKENAZURE_TENANT_IDAZURE_CLIENT_SECRETAZURE_CLIENT_IDSLACK_BOT_TOKENGH_AW_BOT_DETECTION_TOKENCONTEXT🛡️ Security Posture
Protection Mechanisms
✅ Redaction System: 153/153 workflows have
redact_secretssteps (100% coverage)✅ Token Cascade Pattern: 476 instances of
GH_AW_GITHUB_MCP_SERVER_TOKEN || secrets.GH_AW_GITHUB_TOKEN || secrets.GITHUB_TOKENfallback chains✅ Explicit Permissions: 153/153 workflows define
permissions:blocks (100% coverage)✅ No Secrets in Outputs: 0 secret references found in job output declarations
Security Checks
View Token Distribution Analysis
The token cascade pattern
GH_AW_GITHUB_MCP_SERVER_TOKEN || GH_AW_GITHUB_TOKEN || GITHUB_TOKENis the dominant auth pattern, appearing 476 times. This ensures graceful fallback across token types:GH_AW_GITHUB_MCP_SERVER_TOKEN) — 777 refs — preferred when available for MCP server accessGH_AW_GITHUB_TOKEN) — 1,626 refs — standard token for most operationsGITHUB_TOKEN) — 1,656 refs — always-available fallbackAI Engine Token Distribution:
🎯 Key Findings
GitHub auth tokens dominate — GitHub authentication tokens (
GITHUB_TOKEN,GH_AW_GITHUB_TOKEN,GH_AW_GITHUB_MCP_SERVER_TOKEN,COPILOT_GITHUB_TOKEN) account for 4,570 of ~3,651 total references, confirming the primary use-case is GitHub operations via MCP and direct API.Multi-engine coverage — Secrets for three distinct AI engines (Anthropic, OpenAI/Codex, Copilot) are present, reflecting the multi-engine architecture. No single engine monopolizes the credential surface.
Perfect security hygiene — 100% redaction and 100% permission block coverage across all 153 workflows is an excellent baseline. The zero-secrets-in-outputs finding confirms workflows don't accidentally leak credentials to downstream jobs.
Niche integrations present — Monitoring (Datadog × 3), error tracking (Sentry × 2), Azure auth (× 2), Slack (× 1), and Notion (× 6) represent a small but real expansion of the credential surface beyond GitHub and AI engines.
💡 Recommendations
Monitor
CONTEXTsecret — TheCONTEXTsecret name (2 occurrences) is non-descriptive. Consider auditing these workflows to verify this is intentional naming and not a leftover placeholder.Review Azure credential scope — 2 workflows use Azure credentials (
AZURE_TENANT_ID,AZURE_CLIENT_SECRET,AZURE_CLIENT_ID). Ensure these are scoped to minimum required permissions and reviewed periodically.Consider
GH_AW_AGENT_TOKENdocumentation — With only 4 references, this token's purpose may not be obvious. Adding documentation to the secrets spec would help future maintainers understand its role vs.GH_AW_GITHUB_TOKEN.Maintain 100% redaction coverage — The current perfect coverage is a high bar to maintain as new workflows are added. Consider adding a CI check that verifies every
.lock.ymlcontains a redaction step.📖 Reference Documentation
scratchpad/secrets-yml.mdactions/setup/js/redact_secrets.cjsReferences: §22197963734
Beta Was this translation helpful? Give feedback.
All reactions