Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
detect-secrets is an aptly named module for (surprise, surprise) detecting secrets within a code base. However, unlike other similar packages that solely focus on finding secrets, this package is designed with the enterprise client in mind: providing a backwards compatible, systematic means of: Preventing new secrets from entering the code base, Detecting if such preventions are explicitly bypassed, and Providing a checklist of secrets to roll, and migrate off to a more secure storage. | Protect your Node.js projects from supply chain attacks. Scan npm packages for malware, crypto-drainers, and security vulnerabilities. Real-time threat intelligence database tracking malicious packages. |
| - | Real-time malicious package detection, Deep static analysis for suspicious scripts, Typosquat and impersonation detection, Obfuscated code pattern scanning, Crypto-drainer and wallet-stealer detection, Dependency risk scoring, Abandoned and unmaintained package alerts, Install-script behavior analysis, Malware signature database, Security vulnerability indicators, Zero-setup package scanning, Instant risk report generation, Threat intelligence dashboard, Package metadata trust scoring, Automated reputation and maintainer checks |
Statistics | |
GitHub Stars 4.3K | GitHub Stars - |
GitHub Forks 533 | GitHub Forks - |
Stacks 54 | Stacks 0 |
Followers 10 | Followers 1 |
Votes 0 | Votes 1 |
Integrations | |
| No integrations available | |

The first platform scanning all GitHub public activity in real time for API secret tokens, database credentials or vault keys. Be alerted in seconds. Integrate in minutes.

Secrets, authentication tokens, passwords, and keys pose a security risk if they are left unprotected in production workloads. SecretScanner inspects file systems and running containers, identifying over 140 different types of secret data.