Skip to content

Latest commit

 

History

History
15 lines (13 loc) · 3.08 KB

TOOLS.md

File metadata and controls

15 lines (13 loc) · 3.08 KB

Many tools exist to search a Git repository for potentially sensitive information. Each of these may have different capabilities and use different detection methods.

Here is a curated list of the secret detection tools we've come across:

Name URL Installs Pre-Commit Hook? Supported by watcher Description
detect-secrets https://github.com/Yelp/detect-secrets An enterprise friendly way of detecting and preventing secrets in code.
git-secrets https://github.com/awslabs/git-secrets/blob/master/git-secrets Prevents you from committing secrets and credentials into git repositories
truffleHog https://github.com/dxa4481/truffleHog Searches through git repositories for high entropy strings and secrets, digging deep into commit history
yar https://github.com/Furduhlutur/yar Yar is a tool for plunderin' organizations, users and/or repositories.
repo-supervisor https://github.com/auth0/repo-supervisor Scan your code for security misconfiguration, search for passwords and secrets. 🔍
gitleaks https://github.com/zricethezav/gitleaks Audit git repos for secrets 🔑
gitrob https://github.com/michenriksen/gitrob Reconnaissance tool for GitHub organizations
repo-security-scanner https://github.com/UKHomeOffice/repo-security-scanner CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys
GitGot https://github.com/BishopFox/GitGot Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.