You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: descriptions/api.github.com/api.github.com.json
+41-54Lines changed: 41 additions & 54 deletions
Original file line number
Diff line number
Diff line change
@@ -13229,50 +13229,28 @@
13229
13229
},
13230
13230
"/orgs/{org}/secret-scanning/alerts": {
13231
13231
"get": {
13232
-
"summary": "List secret scanning alerts by organization",
13233
-
"description": "Lists all secret scanning alerts for all eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
13232
+
"summary": "List secret scanning alerts for an organization",
13233
+
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"description": "A comma-separated list of resolutions. Only secret scanning alerts with one of these resolutions are listed. Valid resolutions are `false_positive`, `wont_fix`, `revoked`, `pattern_edited`, `pattern_deleted` or `used_in_tests`.",
"summary": "List secret scanning alerts for a repository",
39710
-
"description": "Lists all secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
39688
+
"description": "Lists secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
39711
39689
"tags": [
39712
39690
"secret-scanning"
39713
39691
],
@@ -39724,35 +39702,13 @@
39724
39702
"$ref": "#/components/parameters/repo"
39725
39703
},
39726
39704
{
39727
-
"name": "state",
39728
-
"in": "query",
39729
-
"description": "Set to `open` or `resolved` to only list secret scanning alerts in a specific state.",
"description": "A comma-separated list of secret types to return. By default all secret types are returned. See \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\" for a complete list of secret types (API slug).",
"description": "A comma-separated list of resolutions. Only secret scanning alerts with one of these resolutions are listed. Valid resolutions are `false_positive`, `wont_fix`, `revoked`, `pattern_edited`, `pattern_deleted` or `used_in_tests`.",
"description": "Set to `open` or `resolved` to only list secret scanning alerts in a specific state.",
99686
+
"required": false,
99687
+
"schema": {
99688
+
"type": "string",
99689
+
"enum": [
99690
+
"open",
99691
+
"resolved"
99692
+
]
99693
+
}
99694
+
},
99695
+
"secret-scanning-alert-secret-type": {
99696
+
"name": "secret_type",
99697
+
"in": "query",
99698
+
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
99699
+
"required": false,
99700
+
"schema": {
99701
+
"type": "string"
99702
+
}
99703
+
},
99704
+
"secret-scanning-alert-resolution": {
99705
+
"name": "resolution",
99706
+
"in": "query",
99707
+
"description": "A comma-separated list of resolutions. Only secret scanning alerts with one of these resolutions are listed. Valid resolutions are `false_positive`, `wont_fix`, `revoked`, `pattern_edited`, `pattern_deleted` or `used_in_tests`.",
Copy file name to clipboardExpand all lines: descriptions/api.github.com/api.github.com.yaml
+40-55Lines changed: 40 additions & 55 deletions
Original file line number
Diff line number
Diff line change
@@ -9516,9 +9516,9 @@ paths:
9516
9516
subcategory:
9517
9517
"/orgs/{org}/secret-scanning/alerts":
9518
9518
get:
9519
-
summary: List secret scanning alerts by organization
9519
+
summary: List secret scanning alerts for an organization
9520
9520
description: |-
9521
-
Lists all secret scanning alerts for all eligible repositories in an organization, from newest to oldest.
9521
+
Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.
9522
9522
To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.
9523
9523
9524
9524
GitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.
summary: List secret scanning alerts for a repository
28433
28411
description: |-
28434
-
Lists all secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.
28412
+
Lists secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.
28435
28413
28436
28414
GitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.
28437
28415
tags:
@@ -28443,32 +28421,9 @@ paths:
28443
28421
parameters:
28444
28422
- "$ref": "#/components/parameters/owner"
28445
28423
- "$ref": "#/components/parameters/repo"
28446
-
- name: state
28447
-
in: query
28448
-
description: Set to `open` or `resolved` to only list secret scanning alerts
28449
-
in a specific state.
28450
-
required: false
28451
-
schema:
28452
-
type: string
28453
-
enum:
28454
-
- open
28455
-
- resolved
28456
-
- name: secret_type
28457
-
in: query
28458
-
description: A comma-separated list of secret types to return. By default
28459
-
all secret types are returned. See "[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)"
28460
-
for a complete list of secret types (API slug).
28461
-
required: false
28462
-
schema:
28463
-
type: string
28464
-
- name: resolution
28465
-
in: query
28466
-
description: A comma-separated list of resolutions. Only secret scanning alerts
28467
-
with one of these resolutions are listed. Valid resolutions are `false_positive`,
28468
-
`wont_fix`, `revoked`, `pattern_edited`, `pattern_deleted` or `used_in_tests`.
description: Set to `open` or `resolved` to only list secret scanning alerts
76062
+
in a specific state.
76063
+
required: false
76064
+
schema:
76065
+
type: string
76066
+
enum:
76067
+
- open
76068
+
- resolved
76069
+
secret-scanning-alert-secret-type:
76070
+
name: secret_type
76071
+
in: query
76072
+
description: |-
76073
+
A comma-separated list of secret types to return. By default all secret types are returned.
76074
+
See "[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)"
76075
+
for a complete list of secret types (API slug).
76076
+
required: false
76077
+
schema:
76078
+
type: string
76079
+
secret-scanning-alert-resolution:
76080
+
name: resolution
76081
+
in: query
76082
+
description: A comma-separated list of resolutions. Only secret scanning alerts
76083
+
with one of these resolutions are listed. Valid resolutions are `false_positive`,
76084
+
`wont_fix`, `revoked`, `pattern_edited`, `pattern_deleted` or `used_in_tests`.
Copy file name to clipboardExpand all lines: descriptions/api.github.com/dereferenced/api.github.com.deref.json
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -94881,15 +94881,15 @@
94881
94881
},
94882
94882
"/orgs/{org}/secret-scanning/alerts": {
94883
94883
"get": {
94884
-
"summary": "List secret scanning alerts by organization",
94885
-
"description": "Lists all secret scanning alerts for all eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
94884
+
"summary": "List secret scanning alerts for an organization",
94885
+
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.",
94919
+
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
94920
94920
"required": false,
94921
94921
"schema": {
94922
94922
"type": "string"
@@ -347542,7 +347542,7 @@
347542
347542
"/repos/{owner}/{repo}/secret-scanning/alerts": {
347543
347543
"get": {
347544
347544
"summary": "List secret scanning alerts for a repository",
347545
-
"description": "Lists all secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
347545
+
"description": "Lists secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
347546
347546
"tags": [
347547
347547
"secret-scanning"
347548
347548
],
@@ -347584,7 +347584,7 @@
347584
347584
{
347585
347585
"name": "secret_type",
347586
347586
"in": "query",
347587
-
"description": "A comma-separated list of secret types to return. By default all secret types are returned. See \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\" for a complete list of secret types (API slug).",
347587
+
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
0 commit comments