• Icon: Suggestion Suggestion
    • Resolution: Unresolved
    • None
    • Secret Scanning
    • None
    • 1
    • We collect Bitbucket feedback from various sources, and we evaluate what we've collected when planning our product roadmap. To understand how this piece of feedback will be reviewed, see our Implementation of New Features Policy.

      Use case:

      • Action: Security team compose rules to detect new types of secret leakage and apply them globally.
      • Problem: Any newly leaked secrets will be detected, but any previously leaked secrets might remain undetected in the codebase. It's common for secrets to never be touched again after initially being committed to a repository.
      • Solution: After deploying a new security rule, security team initiate a background task to re-scan. An administrative user might click a button in the global secrets scanning admin pages, or use an API to initiate this process. The background process should inspect all files across all refs of all repos, and apply all security scanning rules to each.

      This would be similar in nature to triggering a background reindexing of files for code search, which also has to inspect all files across all repos. If inspecting all refs is too hard, at least scanning the default branch would be better than nothing, since this branch most likely sees regular activity including as part of any software release processes.

            [BSERV-18983] Secret Scanning - Perform Re-Scan on add/update of Rules

            There are no comments yet on this issue.

              Unassigned Unassigned
              8c8205d742ae Priyata Waje
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: