I wouldn’t recommend this. What if GitHub’s token scanning service went down. Ideally GitHub should expose an universal token revocation endpoint.
Alternatively do this in a private repo and enable token revocation (if it exists)
They mean it went down as in stopped working, had some outage; so you've tried to use it as a token revocation service, but it doesn't work (or not as quickly as you expect).
jychang|1 month ago
Obviously you have better methods to revoke your own keys.
securesaml|1 month ago
agreed it shouldn't be used to revoke non-malicious/your own keys
eru|1 month ago
If it's a secret gist, you only exposed the attacker's key to github, but not to the wider public?
OJFord|1 month ago