activity_dashboard_events_by_actionactivity_dashboard_events_by_actoractivity_dashboard_events_by_orgactivity_dashboard_events_by_repositoryactivity_dashboard_events_by_source_ipactivity_dashboard_secret_scanning_alertsactivity_dashboard_total_eventsbranch_protection_disabledbranch_protection_policy_overriddenorganization_application_installedorganization_application_uninstalledorganization_ip_allow_list_entry_updatedorganization_moderator_addedorganization_moderator_removedorganization_ownership_transferredorganization_two_factor_authentication_disabledorganization_user_addedorganization_user_granted_owner_roleorganization_user_removedpersonal_access_token_grantedrepository_archivedrepository_member_updatedrepository_visibility_set_publicrepository_vulnerability_alert_dismissed
Query: personal_access_token_granted
Usage
powerpipe query github_audit_log_detections.query.personal_access_token_granted
Tailpipe Tables
SQL
select tp_timestamp as timestamp, action as operation, additional_fields ->> 'user_programmatic_access_name' as resource, actor, tp_source_ip as source_ip, tp_index as organization, split_part(repo, '/', 2) as repository, tp_id as source_id, * exclude (actor, timestamp)from github_audit_logwhere action in ('personal_access_token.access_granted')order by tp_timestamp desc;
Detections
The query is being used by the following detections: