Skip to content

Conversation

@SamMorrowDrums
Copy link
Collaborator

Enable checking of repository settings, and add a specific tool for toggling secret scanning settings only.

Screencast.From.2025-03-30.01-30-15.mp4

Advanced Security is a pre-requisite for using this on private repos (and or Secret Protection SKU when it launches next week), so we will need to handle those quirks.

I had to make some manual http calls, because the go wrapper does not wrap this feature.

TODO before merge:

  • decide on cleanest way to handle the public/private repo stuff where there is a pre-requisite to enabling secret protection
  • we could just have a catch-all configuration setting endpoint, with the massive number of possible settings?
  • I can make all fields optional, but the annoying thing is that you can't have push protection on, without secret protection. The API is not conducive to wrapping neatly in a tool, but I must find a way.
  • can we also enable Code Scanning default setup?
  • add tests

@williammartin
Copy link
Collaborator

williammartin commented Apr 23, 2025

@SamMorrowDrums what do you want to do with this PR?

Should we kick this back to an issue to discuss?

@SamMorrowDrums
Copy link
Collaborator Author

I think this is that issue:

#176

And now that we have the secret protection toolset, I think we can probably proceed.

DaleSeo pushed a commit to DaleSeo/github-mcp-server that referenced this pull request Oct 24, 2025
@github-actions github-actions bot added the stale label Nov 20, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants