pub struct SecretScanningControl;Expand description
Validates that secret scanning is enabled on the repository.
Maps to SOC2 CC6.1 / CC6.6: protect credentials and prevent leakage. ASPM signal — secret scanning prevents accidental exposure of API keys, tokens, and other credentials in source code.
Evaluation tiers:
- Satisfied: scanning enabled AND push protection enabled (prevention)
- Satisfied (with caveat): scanning enabled but push protection off (detection only)
- Violated: scanning not enabled
Trait Implementations§
Source§impl Control for SecretScanningControl
impl Control for SecretScanningControl
Source§fn description(&self) -> &'static str
fn description(&self) -> &'static str
Human-readable description for SARIF rule output.
Source§fn evaluate(&self, evidence: &EvidenceBundle) -> Vec<ControlFinding>
fn evaluate(&self, evidence: &EvidenceBundle) -> Vec<ControlFinding>
Evaluates the evidence bundle and returns one finding per subject.
Source§fn tsc_criteria(&self) -> &'static [&'static str]
fn tsc_criteria(&self) -> &'static [&'static str]
SOC2 Trust Services Criteria this control maps to (e.g., &[“CC6.1”, “CC8.1”]).
Returns empty slice for controls not mapped to SOC2.
Auto Trait Implementations§
impl Freeze for SecretScanningControl
impl RefUnwindSafe for SecretScanningControl
impl Send for SecretScanningControl
impl Sync for SecretScanningControl
impl Unpin for SecretScanningControl
impl UnsafeUnpin for SecretScanningControl
impl UnwindSafe for SecretScanningControl
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more