You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Analyzed 154 compiled workflow files (.lock.yml) for secret usage patterns and security controls. The repository maintains strong security practices with comprehensive redaction, token cascades, and explicit permissions across all workflows.
Key Metrics:
Total Secret References: 3,401 (secrets.* expressions)
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
Analyzed 154 compiled workflow files (
.lock.yml) for secret usage patterns and security controls. The repository maintains strong security practices with comprehensive redaction, token cascades, and explicit permissions across all workflows.Key Metrics:
secrets.*expressions)github.tokenexpressions)🔑 Top 10 Secrets by Usage
GITHUB_TOKENGH_AW_GITHUB_TOKENGH_AW_GITHUB_MCP_SERVER_TOKENCOPILOT_GITHUB_TOKENCLAUDE_CODE_OAUTH_TOKENANTHROPIC_API_KEYOPENAI_API_KEYCODEX_API_KEYTAVILY_API_KEYNOTION_API_TOKEN🛡️ Security Posture
Protection Mechanisms
✅ Universal Redaction: 154/154 workflows (100%) have secret redaction steps
✅ Token Cascades: 480 instances of fallback chains (
GH_AW_GITHUB_MCP_SERVER_TOKEN || secrets.GH_AW_GITHUB_TOKEN || secrets.GITHUB_TOKEN)✅ Permission Blocks: 154 explicit permission definitions (100% coverage)
✅ Step-Level Scoping: 100% of secrets scoped to steps (zero job-level leakage)
Security Checks
✅ No Secrets in Outputs: Zero instances of secrets in job outputs (potential exposure vector eliminated)
github.event.*patterns detected across workflowsenv:blocksagent-performance-analyzer.lock.yml,ai-moderator.lock.yml,archie.lock.ymlView Complete Secret Inventory (25 types)
GitHub Authentication (4 types)
GITHUB_TOKEN- 1,610 occurrences - Default Actions tokenGH_AW_GITHUB_TOKEN- 1,583 occurrences - Elevated permissions PATGH_AW_GITHUB_MCP_SERVER_TOKEN- 784 occurrences - MCP server authenticationGH_AW_PROJECT_GITHUB_TOKEN- 5 occurrences - Project-specific tokenAI Engine Authentication (8 types)
COPILOT_GITHUB_TOKEN- 509 occurrences - Copilot API accessCLAUDE_CODE_OAUTH_TOKEN- 185 occurrences - Claude OAuth credentialsANTHROPIC_API_KEY- 185 occurrences - Anthropic API keyOPENAI_API_KEY- 64 occurrences - OpenAI API accessCODEX_API_KEY- 64 occurrences - Codex API accessSENTRY_OPENAI_API_KEY- 2 occurrences - Sentry OpenAI integrationGH_AW_BOT_DETECTION_TOKEN- 1 occurrence - Bot detectionGH_AW_AGENT_TOKEN- 4 occurrences - Agent authenticationThird-Party Services (10 types)
TAVILY_API_KEY- 15 occurrences - Tavily search APINOTION_API_TOKEN- 6 occurrences - Notion integrationBRAVE_API_KEY- 4 occurrences - Brave search APIDD_API_KEY- 3 occurrences - Datadog APIDD_APPLICATION_KEY- 3 occurrences - Datadog applicationDD_SITE- 3 occurrences - Datadog site configSENTRY_ACCESS_TOKEN- 2 occurrences - Sentry integrationAZURE_CLIENT_ID- 2 occurrences - Azure authAZURE_CLIENT_SECRET- 2 occurrences - Azure credentialsAZURE_TENANT_ID- 2 occurrences - Azure tenantSLACK_BOT_TOKEN- 1 occurrence - Slack integrationCONTEXT- 2 occurrences - Context variableView Workflow Distribution by Engine
Secret Usage by AI Engine
All Workflows (154): Use GitHub authentication tokens
GITHUB_TOKEN: 154 workflows (100%)GH_AW_GITHUB_TOKEN: 154 workflows (100%)GH_AW_GITHUB_MCP_SERVER_TOKEN: 154 workflows (100%)Copilot Engine (105 workflows, 68%):
COPILOT_GITHUB_TOKEN: 105 workflowsClaude Engine (37 workflows, 24%):
ANTHROPIC_API_KEY: 37 workflowsCLAUDE_CODE_OAUTH_TOKEN: 37 workflowsOpenAI/Codex Engine (10 workflows, 6%):
OPENAI_API_KEY: 10 workflowsCODEX_API_KEY: 10 workflowsToken Cascade Pattern
All workflows implement the recommended token fallback chain:
This provides:
Total cascade instances: 480 across all workflows
🎯 Key Findings
💡 Recommendations
✅ Maintain Current Practices: The security posture is excellent - continue enforcing:
📊 Monitor Template Interpolation: While current usage appears safe, continue monitoring
github.event.*patterns for:env:blocks🔄 Consider Secret Rotation Policy: With 25 distinct secret types in use, document:
📈 Trend Analysis: Establish baseline for future reports to track:
📖 Reference Documentation
For detailed information about secret usage patterns:
scratchpad/secrets-yml.mdactions/setup/js/redact_secrets.cjsGenerated: 2026-02-15 19:57 UTC
Workflow Run: §22042061852
Analyzed Files: 154
.lock.ymlworkflowsBeta Was this translation helpful? Give feedback.
All reactions