Skip to content

Mention that security policies can be used with secret detection

What does this MR do and why?

This additional line succinctly explains how security policies can be leveraged with secret detection, emphasizing the benefit of consistency across projects, while adding information about using security policies in the context of secret detection.

MR acceptance checklist

Please evaluate this MR against the MR acceptance checklist. It helps you analyze changes to reduce risks in quality, performance, reliability, security, and maintainability.

Merge request reports

Loading