turbot/tailpipe-mod-github-audit-log-detections

Query: branch_protection_disabled

Usage

powerpipe query github_audit_log_detections.query.branch_protection_disabled

Tailpipe Tables

SQL

select
tp_timestamp as timestamp,
action as operation,
concat('https://github.com/', repo, '/tree/', additional_fields ->> 'name') as resource,
actor,
tp_source_ip as source_ip,
tp_index as organization,
split_part(repo, '/', 2) as repository,
tp_id as source_id,
*
exclude (actor, timestamp)
from
github_audit_log
where
action = 'protected_branch.destroy'
order by
tp_timestamp desc;

Detections

The query is being used by the following detections: