Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Google integrates Gemini CLI into Zed code editor

      August 28, 2025

      10 Benefits of Integrating React.js Vibe Coding into Your Agile DevOps Pipeline

      August 28, 2025

      Designing For TV: The Evergreen Pattern That Shapes TV Experiences

      August 27, 2025

      Amplitude launches new self-service capabilities for marketing initiatives

      August 27, 2025

      This Vizio soundbar has impressive surround sound, and it’s on sale

      August 29, 2025

      DJI’s ultralight wireless Mic 3 captures great audio – even in tricky situations

      August 29, 2025

      OpenAI gives its voice agent superpowers to developers – look for more apps soon

      August 29, 2025

      T-Mobile will give you 4 free iPhone 16 phones right now – here’s how to get yours

      August 29, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Optimizing Laravel Livewire Performance with Computed Properties

      August 29, 2025
      Recent

      Optimizing Laravel Livewire Performance with Computed Properties

      August 29, 2025

      Smart Cache Package for Laravel

      August 29, 2025

      This Week in Laravel: Filament 4 Videos and Pest 4 Browser Testing

      August 29, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Containers in 2025: Docker vs. Podman for Modern Developers

      August 29, 2025
      Recent

      Containers in 2025: Docker vs. Podman for Modern Developers

      August 29, 2025

      FOSS Weekly #25.35: New Gerhwin DE, grep Command, Nitro init system, KDE Customization and More Linux Stuff

      August 29, 2025

      19 Beautiful Themes to Get a Better Visual Experience With VS Code

      August 29, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»How we accelerated Secret Protection engineering with Copilot

    How we accelerated Secret Protection engineering with Copilot

    August 28, 2025

    Accidentally committing secrets to source code is a mistake every developer dreads — and one that’s surprisingly easy to make. GitHub Secret Protection was built for moments like these, helping teams catch exposed credentials before they cause harm.

    Secret Protection works by creating alerts for sensitive credentials found in code, and it offers several features to help mitigate leaks even further.

    • Push protection helps stop leaks before they happen by blocking any commits that contain sensitive data and ensuring that credentials do not make it into a code base.
    • Validity checks help users triage alerts by indicating which secrets are active and need immediate attention.
    • The partner program allows for providers to be notified of leaks in public repositories for certain token types. When these types are detected, providers can take immediate action on the exposed secret (e.g. immediate revocation, application of a quarantine policy, notification).
    • Copilot secret scanning allows for detecting generic secrets, things like passwords or connection strings that may not be associated with a specific provider.
    • Custom patterns let you define expressions for detecting secrets that are specific to your project or organization.

    Aaron and I have worked extensively on validity checks during our time at GitHub. It’s become a core part of our product, and many users rely on it day-to-day as part of their triage and remediation workflows. Secret Protection calculates the validity of a leaked credential by testing it against an unobtrusive API endpoint associated with the token’s provider. 

    We released this feature in 2023, and we started by adding validity checks support for the most common token types we saw leaked in code (e.g., AWS keys, GCP credentials, Slack tokens). Secret Protection got to a point where it was validating roughly 80% of newly created alerts. While the less common token types remained (and continue to remain) important, our team shifted focus to make sure we delivered the greatest value for our customers.

    Towards the end of 2024 and into 2025 we gradually saw the advent of agentic AI, and soon coding agents started to gain mainstream popularity. Our team got together earlier this year and had a thought: Could we successfully use coding agents to help cover this gap?

    Augmenting a repeatable workflow

    To identify opportunities for automation, we first took a close look at our existing process for adding validation support for new token types. This framework-driven workflow included the following steps for each token type:

    1. We researched the provider to determine a good endpoint for validating the token in question.
    2. We wrote code — a validator — to implement this change.
    3. We darkshipped the validator, thus allowing us to update our implementation with errors we saw.
    4. We fully shipped the validator by removing the darkship configuration.
    A diagram showing the framework-driven workflow of research, code, darkship (observe), and release. As needed, the workflow can repeat the "code" step after "darkship."

    The coding and release parts (second and fourth steps) of this process were the obvious first choices for automation.

    The first step above involves finding a suitable endpoint to validate a new token type. We typically use  /me (or equivalent) endpoints if they exist. Sometimes they do exist, but they’re buried in documentation and not easy to find. We experimented with handing off this research to Copilot, but it sometimes struggled. It could not reliably find the same least-intrusive endpoint an engineer would choose. We also discovered that creating and testing live tokens, and interpreting nuanced API changes, remained tasks best handled by experienced engineers.

    Copilot did an excellent job of making code changes. The output of the human-driven research task was fed into a manually dispatched GitHub workflow that created a detailed issue we could assign to the coding agent. The issue served as a comprehensive prompt that included background on the project, links to API documentation, and various examples to look at. We learned that the coding agent sometimes struggled with following links, so we added an extra field for any additional notes. 

    Screenshot of the GitHub Actions “Run workflow” form to create a new validator. Form shows a dropdown for branch, and text fields for Token Type, Token Name, Provider, Documentation URL, Endpoint URL, Other Notes for Validator all with sample input using a PAT from Example.comas demonstration.

    After assigning an issue to Copilot, the coding agent automatically generated a pull request, instantly turning our research and planning into actionable, feedback-ready code. We treated code generated by the agent just like code written by our team: it went through automated testing, a human review process, and was eventually deployed by engineers. GitHub provided a streamlined process for requesting changes from the agent — just add comments to a pull request. The agent is not perfect, and it did make some mistakes. For example, we expected that Copilot would follow documentation links in a prompt and reference the information there as it implemented its change, but in practice we found that it sometimes missed details or didn’t follow documentation as intended.

    Our framework included the ability to darkship a validator. That is, we observed the results of our new code without writing validity inferences to the database. It wasn’t uncommon for our engineers to encounter some amount of drift in API documentation and actual behavior. This stage allowed us to safely fix any errors. When we were ready to fully release a change, we asked Copilot to make a small configuration change to take the new validator out of darkship mode.

    The result

    Prior to our AI experimentation, progress was steady but slow. We were validating 32 partner token types. It took us several months to get here as engineers balanced onboarding new checks with day-to-day feature development. With Copilot, we onboarded almost 90 new types in just a few weeks as our engineering interns, @inshalak and @matthew-tzong, directed Copilot through this process.

    Coding agents are a viable option for accelerating framework-driven repeatable workflows with automation. In our case, Copilot was literally a force multiplier. Being able to parallelize the output of N research tasks over N agents was huge. Copilot delivers speed and scale, but it’s no replacement for human engineering judgment. Always review, test, and verify the code it produces. We were successful by grafting Copilot into very specific parts of this framework.

    Takeaways and tips

    Our experiment using Copilot coding agent made a measurable impact: we dramatically accelerated our coverage of token types, parallelized the most time-consuming parts of the workflow, and freed up engineers to focus on the nuanced research and review stages. Copilot didn’t replace the need for thoughtful engineering, but it did prove to be a powerful teammate for framework-driven, repeatable engineering tasks.

    A few things we learned along the way:

    • Automation amplifies repeatability: If you have a process with well-defined steps, coding agents can help you scale your efforts and multiply your impact.
    • Treat Copilot like a team member: Its contributions need the same careful review, testing, and feedback as any human’s code.
    • Prompt quality drives results: Detailed, example-rich prompts (and sometimes extra notes) helped Copilot deliver higher-quality pull requests.
    • Iterate on your process: Prompts often needed refinement, and workflows benefited from small adjustments as we learned what worked best.
    • Parallelization is a superpower: With the right setup, we could assign many tasks at once and unblock work that would have otherwise queued up behind a single engineer.

    We see huge potential for coding agents wherever there are repeatable engineering tasks. We are experimenting with similar processes in other onboarding workflows in our project. We’re confident that many other teams and projects across the industry have similar framework-driven workflows that are great candidates for this kind of automation.

    If you’re looking to bring automation into your own workflow, take advantage of what’s already repeatable, invest in good prompts, and always keep collaboration and review at the center.

    Thanks for reading! We’re excited to see how the next generation of agentic AI and coding agents will continue to accelerate software engineering — not just at GitHub, but across the entire developer ecosystem.

    Validity checks are a feature of GitHub Secret Protection, which offers enterprise-ready solutions for preventing accidental secret exposure in your repositories. Learn more about Secret Protection or get started by running a free risk assessment for your organization.

    The post How we accelerated Secret Protection engineering with Copilot appeared first on The GitHub Blog.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAlyssa Rosenzweig Lascia il Progetto Asahi Linux per Passare a Intel
    Next Article Distribution Release: MODICIA O.S. 6.12.41

    Related Posts

    News & Updates

    This Vizio soundbar has impressive surround sound, and it’s on sale

    August 29, 2025
    News & Updates

    DJI’s ultralight wireless Mic 3 captures great audio – even in tricky situations

    August 29, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-5121 – GitLab Compliance Framework Authorization Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Fortnite Adds Bug Battles — Helldivers Devs Say It ‘Looks Familiar’

    News & Updates

    Microsoft tells Windows 10 users to buy Copilot+ AI Windows 11 PC because it’s better

    Operating Systems

    Your Windows 10 PC isn’t dead yet – this OS from Google can revive it

    News & Updates

    Highlights

    CVE-2025-6678 – Autel MaxiCharger AC Wallbox Commercial PIN Missing Authentication Information Disclosure

    June 25, 2025

    CVE ID : CVE-2025-6678

    Published : June 25, 2025, 6:15 p.m. | 24 minutes ago

    Description : Autel MaxiCharger AC Wallbox Commercial PIN Missing Authentication Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. Authentication is not required to exploit this vulnerability.

    The specific flaw exists within the Pile API. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-26352.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    NativePHP for Mobile v1 — Launching May 2

    April 23, 2025

    Apache Tomcat Patches 4 Flaws: DoS, Privilege Bypass, & Installer Risks Addressed

    June 16, 2025

    As Elden Ring Nightreign leads the pack, Final Fantasy XVI has a solid Xbox debut — Square Enix’s multi-platform strategy for Final Fantasy is paying off in spades

    July 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.