list_secrets_in_build_log
List secrets detected in CI build logs, with masked output and clickable links to each detection. Filter by status (new, suppressed, resolved), organization, or limit results. Includes rule ID, line number, and step number for navigation.
Instructions
List detections where a secret (API key, private key, token, etc.) was detected in a CI build log. The API returns the secret already masked (e.g. '----****') — safe to display. Includes rule_id (which detector fired), line_number and step_number for navigation to the leak. Every result has a dashboard_url — when you present detections to the user you MUST include a clickable link per detection, not just the first one.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| customer | No | StepSecurity customer/tenant identifier. Optional — if omitted, falls back to STEP_SECURITY_CUSTOMER env var. Returns detections aggregated across ALL GitHub orgs installed under this tenant. | |
| status | No | Detection status filter. Defaults to 'new'. | |
| limit | No | Max detections to return (1-200). Defaults to 50. | |
| orgScope | No | Optional: restrict to a single GitHub org under this tenant (uses the owner-scoped endpoint instead of tenant-wide). |