Control: Organization members should not be able to create public repositories
Description
Accidentally creating a public repository can expose code and other assets.
Usage
Run the control in your terminal:
powerpipe control run github_sherlock.control.org_members_cannot_create_public_repos
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run github_sherlock.control.org_members_cannot_create_public_repos --share
Steampipe Tables
SQL
select url as resource, case when members_can_create_public_repos then 'alarm' else 'ok' end as status, login || ' users ' || case when (members_can_create_public_repos)::bool then 'can ' else 'cannot ' end || 'create public repositories.' as reason, loginfrom github_my_organization