doc/user/application_security/vulnerabilities/secret_false_positive_detection.md
{{< details >}}
{{< /details >}}
{{< history >}}
duo_secret_detection_false_positive. Enabled on GitLab.com, GitLab Self-Managed, and GitLab Dedicated.{{< /history >}}
Secret false positive detection is an opt-in feature. When you enable it, GitLab Duo analyzes each detected secret to determine the likelihood that it's a false positive. Detection is available for all secret types detected by GitLab secret detection.
[!important] When this feature is enabled, information about the vulnerability, including the code context surrounding the detected secret, is sent to large language models (LLMs) for analysis. The behavior described in the secret detection and redaction documentation does not apply to this feature. Review your organization's data policies before enabling this feature.
The GitLab Duo assessment includes information about each false positive finding:
Once enabled, false positive detection runs automatically after each security scan without manual intervention.
Results are based on AI analysis and should be reviewed by security professionals. The feature requires GitLab Duo with an active subscription.
False positive detection runs automatically in the following scenarios:
The analysis runs in the background and results appear in the vulnerability report once processing is complete.
You can manually run false positive detection for existing vulnerabilities:
The GitLab Duo analysis runs and displays the results on the vulnerability details page.
To use false positive detection, you must have the following requirements:
False positive detection is turned off by default and must be explicitly enabled. When enabled, information about the vulnerability, including surrounding code context, is sent to LLMs for analysis. To use this feature, you must enable the foundational flow for the group and turn on the feature for the project.
You can allow all projects in a group to use the foundational flow. Individual projects must still enable the feature in their project settings. To allow false positive detection for all projects in a group:
To turn on false positive detection for a specific project:
When you allow false positive detection for the group and turn it on for the project, the feature works automatically with your existing secret detection scanners.
The confidence score estimates how likely the GitLab Duo assessment is to be correct:
When the GitLab Duo analysis identifies a vulnerability as a false positive, you have the following options:
The vulnerability is marked as dismissed and does not appear in future scans unless it is reintroduced.
If you want to remove the false positive assessment and keep the vulnerability:
The false positive flag is removed and the FP confidence score reverts to 0. The vulnerability remains in the report and can be re-evaluated in future scans.
False positive detection is a beta feature and we welcome your feedback. If you encounter issues or have suggestions for improvement, please provide feedback in issue 592861.