Secret Detection is a consistent, platform-wide, on-by-default experience for users
## Problem to Solve
Today, Secret Detection protects users from introducing new secrets into codebases by running in an opt-in MR pipeline. However, there are many other places where secrets _could_ exist. _We need to provide greater coverage in our detection of secrets across the GitLab platform._
## Coverage
Listed below are all the areas where a secret _could_ be leaked in GitLab:
1. Repository Components:
- Source Code
- Git History
- Git Push (push protection)
2. CI/CD Features:
- Pipeline Logs
- Job Artifacts
- .gitlab-ci.yml
3. Collaborative Features:
- Issues (descriptions and comments)
- Merge Requests (descriptions, comments, and diffs)
- _Available today, but only for `glpat`._
4. Documentation:
- Wiki Pages
- Project Snippets
5. Registry Components:
- Container Registry
- Package Registry
---
### Related work/links
- [Advanced Search Token Hunter](https://gitlab.com/gitlab-com/gl-security/appsec/advanced-search-token-hunter) (internal) uses existing search indexing to find leaks in a variety of types of content.
- [UX Research report 1974-D](https://docs.google.com/presentation/d/1du7-Yss4_b5CMXFU_QXmhrH1vKIXwIreT-x41uQ6IZ4/edit#slide=id.g139166cf3c8_0_407) (internal)
- [UX Research](https://docs.google.com/document/d/1DIJG-9SpSfzlbsRJenOb7iikaMc3RZA9_bi1aj5ML9E/edit) (internal) found preventing accidental secret disclosure was a top priority for users. Related research issue, https://gitlab.com/gitlab-org/ux-research/-/issues/1970+.
epic