You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Analyzed 149 compiled workflow files for secret usage patterns and security posture.
Key Metrics:
Total Secret References: 3,151 (secrets.*)
GitHub Token References: 303 (github.token)
Unique Secret Types: 23 distinct secrets
Job-Level Usage: 0 references (0%)
Step-Level Usage: 1,753 references (55.6%)
🔑 Top 10 Secrets by Usage
Rank
Secret Name
Occurrences
Category
1
GITHUB_TOKEN
1,541
GitHub Token
2
GH_AW_GITHUB_TOKEN
1,369
GitHub Token
3
GH_AW_GITHUB_MCP_SERVER_TOKEN
753
GitHub Token
4
COPILOT_GITHUB_TOKEN
488
GitHub Token
5
CLAUDE_CODE_OAUTH_TOKEN
175
AI Provider
6
ANTHROPIC_API_KEY
175
AI Provider
7
OPENAI_API_KEY
71
AI Provider
8
CODEX_API_KEY
71
AI Provider
9
TAVILY_API_KEY
19
Search API
10
GH_AW_AGENT_TOKEN
12
GitHub Token
View All 23 Secrets
Complete Secret Inventory:
ANTHROPIC_API_KEY (175)
AZURE_CLIENT_ID
AZURE_CLIENT_SECRET
AZURE_TENANT_ID (3)
BRAVE_API_KEY (6)
CLAUDE_CODE_OAUTH_TOKEN (175)
CODEX_API_KEY (71)
CONTEXT7_API_KEY (3)
COPILOT_GITHUB_TOKEN (488)
DD_API_KEY (3)
DD_APPLICATION_KEY (3)
DD_SITE (3)
GH_AW_AGENT_TOKEN (12)
GH_AW_GITHUB_MCP_SERVER_TOKEN (753)
GH_AW_GITHUB_TOKEN (1,369)
GH_AW_PROJECT_GITHUB_TOKEN (10)
GITHUB_TOKEN (1,541)
NOTION_API_TOKEN (8)
OPENAI_API_KEY (71)
SENTRY_ACCESS_TOKEN (3)
SENTRY_OPENAI_API_KEY (3)
SLACK_BOT_TOKEN
TAVILY_API_KEY (19)
🛡️ Security Posture
Protection Mechanisms
✅ Redaction System: 149/149 workflows (100%) have redact_secrets step
✅ Token Cascades: 458 instances of secure fallback chains
✅ Permission Blocks: 149 workflows with explicit permission definitions
Security Analysis
Template Injection Risk Analysis
Finding: Detected 1,780 references to github.event.* context
Assessment: ⚠️Medium Risk - Requires further investigation
While github.event.* is commonly used in workflows, direct expression interpolation can lead to template injection vulnerabilities if user-controlled data is not properly sanitized.
Recommendation: Audit workflows using github.event.* to ensure:
User input is passed through environment variables (not direct expression interpolation)
Input validation is in place for user-controlled fields
Safe-inputs feature is enabled where applicable
Secrets in Job Outputs
✅ No issues found - Zero secrets referenced in job outputs
All workflows properly isolate secrets within step-level environment variables, preventing accidental exposure through job outputs.
📈 Usage Patterns
Secret Distribution by Category
GitHub Tokens (4,163 references - 93.9% of step-level usage):
GITHUB_TOKEN: 1,541 (49.6% of all secrets)
GH_AW_GITHUB_TOKEN: 1,369 (43.4%)
GH_AW_GITHUB_MCP_SERVER_TOKEN: 753 (23.9%)
COPILOT_GITHUB_TOKEN: 488 (15.5%)
GH_AW_AGENT_TOKEN: 12 (0.4%)
AI Provider Keys (492 references - 15.6%):
CLAUDE_CODE_OAUTH_TOKEN: 175
ANTHROPIC_API_KEY: 175
OPENAI_API_KEY: 71
CODEX_API_KEY: 71
Third-Party APIs (39 references - 1.2%):
TAVILY_API_KEY: 19 (search)
NOTION_API_TOKEN: 8 (workspace)
BRAVE_API_KEY: 6 (search)
Monitoring/observability: 6 (Datadog, Sentry)
Structural Placement
Step-Level Dominance: 100% of tracked secret usage occurs at the step level
Step-level: 1,753 references (55.6% of all secrets)
Job-level: 0 references (0%)
Other: 1,398 references (44.4%) - includes direct interpolation, conditionals, and inline usage
This pattern indicates excellent isolation practices - secrets are scoped to individual steps rather than exposed to entire jobs.
🎯 Key Findings
Comprehensive Redaction: All 149 workflows implement the redact_secrets step, ensuring no accidental secret leakage in logs.
Token Cascade Pattern: 458 instances of the secure fallback pattern (GH_AW_GITHUB_MCP_SERVER_TOKEN || GH_AW_GITHUB_TOKEN || GITHUB_TOKEN) provide robust token availability without hardcoding.
GitHub Token Dominance: GitHub-related tokens account for 93.9% of secret usage, reflecting the repository's focus on GitHub automation and MCP server integration.
AI Engine Integration: 492 references to AI provider keys (Anthropic, OpenAI, Codex) indicate extensive AI-powered workflow capabilities.
Step-Level Isolation: 100% adherence to step-level secret scoping prevents accidental exposure across job boundaries.
💡 Recommendations
High Priority
Audit github.event.* Usage:
Review 1,780 instances for potential template injection risks
Ensure user-controlled input passes through environment variables
Enable safe-inputs feature for workflows accepting external data
Token Cascade Standardization:
Document the token cascade pattern in repository guidelines
Ensure all new workflows follow the same fallback pattern
Consider extracting to a reusable composite action
Medium Priority
Secret Name Consistency:
Standardize naming conventions across GitHub tokens
Consider consolidating similar tokens (e.g., multiple GitHub token types)
Third-Party API Monitoring:
Track usage of third-party API keys over time
Implement rate limiting and quota monitoring
Document API key rotation procedures
Low Priority
Permission Block Documentation:
All workflows have permission blocks (excellent!)
Document best practices for permission scoping
Create templates for common permission patterns
📖 Reference Documentation
For detailed information about secret usage patterns and security best practices:
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
Analyzed 149 compiled workflow files for secret usage patterns and security posture.
Key Metrics:
secrets.*)github.token)🔑 Top 10 Secrets by Usage
GITHUB_TOKENGH_AW_GITHUB_TOKENGH_AW_GITHUB_MCP_SERVER_TOKENCOPILOT_GITHUB_TOKENCLAUDE_CODE_OAUTH_TOKENANTHROPIC_API_KEYOPENAI_API_KEYCODEX_API_KEYTAVILY_API_KEYGH_AW_AGENT_TOKENView All 23 Secrets
Complete Secret Inventory:
🛡️ Security Posture
Protection Mechanisms
✅ Redaction System: 149/149 workflows (100%) have
redact_secretsstep✅ Token Cascades: 458 instances of secure fallback chains
✅ Permission Blocks: 149 workflows with explicit permission definitions
Security Analysis
Template Injection Risk Analysis
Finding: Detected 1,780 references to
github.event.*contextAssessment:⚠️ Medium Risk - Requires further investigation
While
github.event.*is commonly used in workflows, direct expression interpolation can lead to template injection vulnerabilities if user-controlled data is not properly sanitized.Recommendation: Audit workflows using
github.event.*to ensure:Secrets in Job Outputs
✅ No issues found - Zero secrets referenced in job outputs
All workflows properly isolate secrets within step-level environment variables, preventing accidental exposure through job outputs.
📈 Usage Patterns
Secret Distribution by Category
GitHub Tokens (4,163 references - 93.9% of step-level usage):
GITHUB_TOKEN: 1,541 (49.6% of all secrets)GH_AW_GITHUB_TOKEN: 1,369 (43.4%)GH_AW_GITHUB_MCP_SERVER_TOKEN: 753 (23.9%)COPILOT_GITHUB_TOKEN: 488 (15.5%)GH_AW_AGENT_TOKEN: 12 (0.4%)AI Provider Keys (492 references - 15.6%):
CLAUDE_CODE_OAUTH_TOKEN: 175ANTHROPIC_API_KEY: 175OPENAI_API_KEY: 71CODEX_API_KEY: 71Third-Party APIs (39 references - 1.2%):
TAVILY_API_KEY: 19 (search)NOTION_API_TOKEN: 8 (workspace)BRAVE_API_KEY: 6 (search)Structural Placement
Step-Level Dominance: 100% of tracked secret usage occurs at the step level
This pattern indicates excellent isolation practices - secrets are scoped to individual steps rather than exposed to entire jobs.
🎯 Key Findings
Comprehensive Redaction: All 149 workflows implement the
redact_secretsstep, ensuring no accidental secret leakage in logs.Token Cascade Pattern: 458 instances of the secure fallback pattern (
GH_AW_GITHUB_MCP_SERVER_TOKEN || GH_AW_GITHUB_TOKEN || GITHUB_TOKEN) provide robust token availability without hardcoding.GitHub Token Dominance: GitHub-related tokens account for 93.9% of secret usage, reflecting the repository's focus on GitHub automation and MCP server integration.
AI Engine Integration: 492 references to AI provider keys (Anthropic, OpenAI, Codex) indicate extensive AI-powered workflow capabilities.
Step-Level Isolation: 100% adherence to step-level secret scoping prevents accidental exposure across job boundaries.
💡 Recommendations
High Priority
Audit
github.event.*Usage:Token Cascade Standardization:
Medium Priority
Secret Name Consistency:
Third-Party API Monitoring:
Low Priority
📖 Reference Documentation
For detailed information about secret usage patterns and security best practices:
scratchpad/secrets-yml.mdactions/setup/js/redact_secrets.cjsactions/setup/js/setup_env.cjs🔗 Workflow Context
.github/workflows/daily-secrets.mdBeta Was this translation helpful? Give feedback.
All reactions