Docs tutorial: Pipeline secret detection
<!--IssueSummary start--> <details> <summary> Everyone can contribute. [Help move this issue forward](https://handbook.gitlab.com/handbook/marketing/developer-relations/contributor-success/community-contributors-workflows/#contributor-links) while earning points, leveling up and collecting rewards. </summary> - [Close this issue](https://contributors.gitlab.com/manage-issue?action=close&projectId=278964&issueIid=389519) </details> <!--IssueSummary end--> **Problem:** Developers can easily commit to a Git repository sensitive information - for example, private SSH keys and tokens. Misuse of this information can result in severe consequences for any organization. **Solution:** Provide an end-to-end tutorial of how sensitive information is detected by pipeline secret detection, and what to do afterward. Outline: - Create new project. - Enable Secret Detection. - Commit a simple change (without any sensitive information). - Add sensitive information to the README file. - Commit the change and create a merge request. - View the details of the MR pipeline, which details the secret. - Remove the sensitive information from the README file. - Re-run the MR pipeline.
issue