Secrets can be blocked from reaching shared repositories with the help of ggshield, the GitGuardian CLI, and through the setup of pre-receive git hooks.
This is only applicable for organizations running their own GitHub, GitHub Enterprise, or GitLab instances. If this is your case, the VCS site administrator can create and remove pre-receive hooks for your entire organization and its associated repositories.
What is a pre-receive hook?Pre-receive hooks run tests on code pushed to a repository to ensure contributions meet repository or organization policy. If the commit contents pass the tests, the push will be accepted into the repository. If the commit contents contain any secrets, the push will not be accepted. If your push isn’t accepted, you will see an error message corresponding to the failed pre- receive hook. Source: from the git book section on git hooks
Pre-receive hooks are configured once for the VCS instance and are the most effective tool to prevent secrets from reaching your codebase.