Add secret prevention: gitleaks pre-commit hook and .gitignore expansion#2201
Open
martijnbar wants to merge 1 commit intoai/mainfrom
Open
Add secret prevention: gitleaks pre-commit hook and .gitignore expansion#2201martijnbar wants to merge 1 commit intoai/mainfrom
martijnbar wants to merge 1 commit intoai/mainfrom
Conversation
- Add gitleaks secret scanning to pre-commit hook (all branches), blocking commits if gitleaks is not installed or if secrets are detected in staged files - Expand .gitignore with common secret file patterns (.env, *.pem, *.key, *.pfx, credentials.json, etc.) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
rolfheij-sil
approved these changes
Apr 15, 2026
lyonsil
approved these changes
Apr 15, 2026
Member
lyonsil
left a comment
There was a problem hiding this comment.
@lyonsil reviewed 2 files and all commit messages, and made 1 comment.
Reviewable status:complete! all files reviewed, all discussions resolved.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
.gitignorewith common secret file patterns (.env,*.pem,*.key,*.pfx,credentials.json, etc.)Companion PR: See ai-prompts PR for Claude rule and settings changes.
Manual action required
Test plan
-----BEGIN RSA PRIVATE KEY-----and verify the commit is blockedgitleaksbinary and verify commit shows install instructions and is blocked.envfile and verifygit statusignores it🤖 Generated with Claude Code
Co-Authored-By: Claude Opus 4.5 noreply@anthropic.com
This change is