thoughtworks / talisman

Using a pre-commit hook, Talisman validates the outgoing changeset for things that look suspicious — such as tokens, passwords, and private keys.
https://thoughtworks.github.io/talisman/
MIT License
1.87k stars 241 forks source link

Official github action #433

Open audunmo opened 11 months ago

audunmo commented 11 months ago

Is your feature request related to a problem? Please describe. I want to be able to block PRs until new secrets are either marked as false-positive, or purged from the git history. I think it's unlikely that we'll be able to get every dev to install this hook in every repo, and to install the utility locally. They're honestly likely to just up the usage of --no-verify.

Describe the solution you'd like I'd like to have an officially supported Github Action that will provide feedback on what secrets are potentially present, and to generate failing checks until the secret is marked as safe, or removed from the git history of the branch

Describe alternatives you've considered There are some third-party actions built on Talisman, but I'm wary of using them because they're not implemented by thoughtworks. I'd feel more at ease using actions that have your blessing and backing.

If we were running GH Enterprise Server, I'd have installed Talisman as a hook serverside, but that's not the case.