All GitHub organizations under the Syensqo-SA enterprise are governed by a set of centrally managed repository policies. These policies are automatically applied to ensure consistent security and code quality standards across all teams.
Current Status: Policies are currently running in Evaluate Mode -- your actions are not blocked yet, but violations are being recorded. This allows teams to review and adapt before full enforcement is switched on.
There are three categories of policies applied across all repositories in every organization listed above.
These rules apply to the default branch (e.g., main) of every repository.
Policy | What It Means for You |
No branch deletion | The default branch cannot be deleted by anyone |
No force pushes | git push --force to the default branch is blocked |
Pull Request required | You cannot push directly to the default branch -- all changes must come through a Pull Request |
2 approvals required | A PR needs at least 2 approving reviews before it can be merged |
You cannot approve your own last push | If you pushed the most recent commit in a PR, you cannot be one of the approvers |
All review threads must be resolved | Every comment thread on the PR must be marked as resolved before the PR can be merged |
Example scenarios:
These rules are checked at the time of git push, before any PR is involved. If your push violates these rules, it will be flagged immediately.
Policy | What It Means for You |
Max file path length: 25 characters | File paths (relative to the repo root) longer than 25 characters will be flagged |
Blocked file types: .bin, .exe | You cannot push binary executable files into any repository |
Max file size: 4 MB | Individual files larger than 4 MB cannot be pushed |
Example scenarios:
Note: Push policies apply to every branch, not just the default branch.
These rules protect existing tags across all repositories.
Policy | What It Means for You |
No tag deletion | Once a tag is created, it cannot be deleted |
No force pushes to tags | You cannot overwrite an existing tag (e.g., moving v1.0.0 to a different commit) |
Example scenarios:
You can view the active rulesets applied to any repository or organization directly in the GitHub UI.
Each ruleset entry shows:

Since policies are currently in Audit (Evaluate) mode, your pushes and PRs are not hard-blocked yet. However, any violation is recorded and visible in the repository Rule Insights view.
The Rule Insights page shows a log of all recent activity that was evaluated against rulesets:
Column | Description |
Ruleset name | Which policy evaluated the action |
Actor | The user who triggered the action |
Target | The branch, tag, or file that was affected |
Result | Pass, Active bypass, Evaluate bypass, or Fail |
Timestamp | When the event occurred |

If you see Evaluate bypass entries against your recent pushes or PRs, that is a signal that your action will be blocked once enforcement switches to Active mode. Use this window to fix the issue proactively.