| ▲ | securesaml 7 hours ago | ||||||||||||||||||||||||||||||||||
I wouldn’t recommend this. What if GitHub’s token scanning service went down. Ideally GitHub should expose an universal token revocation endpoint. Alternatively do this in a private repo and enable token revocation (if it exists) | |||||||||||||||||||||||||||||||||||
| ▲ | jychang 6 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
You're revoking the attacker's key (that they're using to upload the docs to their own account), this is probably the best option available. Obviously you have better methods to revoke your own keys. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | eru an hour ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
> What if GitHub’s token scanning service went down. If it's a secret gist, you only exposed the attacker's key to github, but not to the wider public? | |||||||||||||||||||||||||||||||||||