← Back
GitHub
GitHub enables push protection exemptions for roles, teams, and applications
GitHub DependabotGitHub · featuresecurityapi · github.blog ↗

Push Protection Exemptions Now Available

GitHub has expanded its secret scanning push protection capabilities to allow organizations to configure exemptions at the role, team, and application level. This new feature provides more granular control over security policies while maintaining flexibility for trusted actors.

How It Works

When an exempt actor (a user in a specific role, team member, or application) attempts to push content containing secrets:

  • Push protection is automatically skipped for that actor
  • No bypass requests are generated, streamlining the workflow for trusted entities
  • Exemption status is evaluated at push time, ensuring real-time policy enforcement

Configuration and Scope

  • Exemptions can be configured at both organization and enterprise levels
  • Management is integrated with GitHub's security configurations framework
  • Settings apply consistently across repositories within the specified scope

Use Cases

This feature is particularly useful for:

  • CI/CD pipelines and automation that legitimately need to handle secrets
  • Service accounts and bot applications that require exemptions
  • Specific teams or roles that need operational flexibility while maintaining security for other contributors

Organizations can configure these exemptions through their security settings to balance security enforcement with operational requirements.