Skip to content

Commit b4cc97c

Browse files
ci: fix Gitleaks — add baseline for 49 known historical secrets
The gitleaks CLI scan works correctly now but finds 49 pre-existing secrets in git history (Supabase anon keys, RunAnywhere API keys, Railway URLs, build tokens) committed across old commits by various authors. These are not new leaks introduced by this PR. Added: - .gitleaksbaseline — JSON baseline of all 49 known findings. Gitleaks uses this to skip known historical secrets and only flag NEW leaks. - docs/secrets-audit.md — human-readable table of every finding with rule, file, commit, author, date, and whether the file still exists on HEAD. Includes action items (rotate still-active secrets). Changed: - secret-scan.yml — gitleaks detect now passes --baseline-path so CI only fails on genuinely NEW secrets, not the 49 historical ones. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent e26952f commit b4cc97c

3 files changed

Lines changed: 1101 additions & 5 deletions

File tree

.github/workflows/secret-scan.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,9 @@ jobs:
4141
4242
- name: Run Gitleaks
4343
run: |
44-
if [ -f .gitleaks.toml ]; then
45-
gitleaks detect --source . --config .gitleaks.toml --redact --verbose
46-
else
47-
gitleaks detect --source . --redact --verbose
48-
fi
44+
ARGS="--source . --redact --verbose"
45+
# Use project config if present
46+
[ -f .gitleaks.toml ] && ARGS="$ARGS --config .gitleaks.toml"
47+
# Use baseline file to ignore known historical findings (only flag NEW leaks)
48+
[ -f .gitleaksbaseline ] && ARGS="$ARGS --baseline-path .gitleaksbaseline"
49+
gitleaks detect $ARGS

0 commit comments

Comments
 (0)