1. GitHub Docs
"About secret scanning": This document explains the partner program
where detected secrets are sent to the service provider for validation. "When a secret is detected in a public repository
GitHub notifies the service provider who issued the secret. The service provider validates the credential and then decides whether they should revoke the secret
issue a new secret
or reach out to you directly..." This validation process is what identifies a secret as "active" and high-risk.
Source: GitHub Docs
docs.github.com/en/code-security/secret-scanning/about-secret-scanning#about-the-secret-scanning-partner-program.
2. GitHub Docs
"Managing alerts from secret scanning": This page details how to manage and filter alerts. While there isn't a literal filter named "active
" the principle of prioritizing based on validity is key. You can filter by secret types that are part of the partner program
which are the ones that get validated. The alert's metadata often indicates its status post-validation. Prioritizing these alerts is the primary strategy for risk reduction.
Source: GitHub Docs
docs.github.com/en/code-security/secret-scanning/managing-alerts-from-secret-scanning#filtering-secret-scanning-alerts.