Skip to content

Investigate the use of git hooks for preventing sensitive data #283

@Cherrett

Description

@Cherrett

Rationale

Investigate the use of git hooks for preventing committing sensitive data. Specifically, pre-receive hooks might be used for this case:

image

This might be carried out by creating regex rules for any sensitive data within such hooks.

Summary of above:

  • Investigate different types of sensitive data which we want to prevent
  • Investigate how git hooks can be used to prevent a developer from pushing sensitive data to a repository
  • Create the required scripts for preventing the inclusion of all types of sensitive data
  • Create a proof-of-concept on a dummy repository to confirm the investigation

For ticket closure

If the outcome of the investigation is successful, we should have a clear plan for using git hooks to prevent sensitive data from being pushed to the repository. This would ideally be paired with a proof-of-concept on a dummy repo.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions