1. GitHub Docs
"About secret scanning."
Section: "About secret scanning for public repositories"
Content: "When secret scanning detects a set of credentials in a public repository
GitHub notifies the service provider who issued the secret. The service provider validates the credential and then decides whether they should revoke the secret
issue a new secret
or reach out to you directly..." This directly supports answer A.
2. GitHub Docs
"Protecting pushes with secret scanning."
Section: "About push protection for secret scanning"
Content: "Push protection for secret scanning is available on repositories with a GitHub Advanced Security license." This confirms that blocking pushes (Option B) is a distinct
non-default feature.
3. GitHub Docs
"Managing alerts from secret scanning."
Section: "About alerts for secret scanning"
Content: "When a secret is detected in a repository
GitHub generates a security alert... GitHub notifies the repository administrators and organization owners about security alerts by default." This shows that notification occurs
but the provider notification (Option A) is the unique
primary action for public repositories. It also clarifies that webhooks (Option D) are a method of notification
not the action itself.