Automatically disable user SSH or GPG keys discovered by Secret Detection
Everyone can contribute. Help move this issue forward while earning points, leveling up and collecting rewards.
Proposal
With the work completed in Automatically revoke GitLab.com PATs discovered... (#371658 - closed), GitLab now auto-revokes leaked PATs in public projects.
Could GitLab consider expanding this to support auto-revocation of leaked private ssh or gpg keys? Revocation in this case essentially meaning to immediately expire them on the user's GitLab account.
Edited by 🤖 GitLab Bot 🤖