Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
detect-secrets is an aptly named module for (surprise, surprise) detecting secrets within a code base. However, unlike other similar packages that solely focus on finding secrets, this package is designed with the enterprise client in mind: providing a backwards compatible, systematic means of: Preventing new secrets from entering the code base, Detecting if such preventions are explicitly bypassed, and Providing a checklist of secrets to roll, and migrate off to a more secure storage. | Advanced stealth web data collection framework for security - xsser01/phantomcollect |
| - | Browser fingerprinting collection, GPS and IP geolocation detection, Stealth data gathering, Device hardware profiling, Network information collection, Educational security tool, Open source Python framework, Real-time data logging |
Statistics | |
GitHub Stars 4.3K | GitHub Stars - |
GitHub Forks 533 | GitHub Forks - |
Stacks 54 | Stacks 0 |
Followers 10 | Followers 1 |
Votes 0 | Votes 1 |
Integrations | |
| No integrations available | |

The first platform scanning all GitHub public activity in real time for API secret tokens, database credentials or vault keys. Be alerted in seconds. Integrate in minutes.

Secrets, authentication tokens, passwords, and keys pose a security risk if they are left unprotected in production workloads. SecretScanner inspects file systems and running containers, identifying over 140 different types of secret data.