GitGuardian unveils “HasMySecretLeaked” to convey leak detection to DevOps pipelines


GitGuardian launched a free instrument referred to as ‘HasMySecretLeaked’ to help safety engineers in proactively checking if their group’s confidential info has been uncovered on GitHub.com. 

This instrument addresses the problem of safeguarding secrets and techniques within the cloud-native utility improvement realm, the place organizations wrestle with secrets and techniques spreading throughout developer instruments. In keeping with the corporate, these secrets and techniques are additionally susceptible to being leaked, particularly throughout off-hours, and would possibly find yourself in private GitHub repositories outdoors the group’s attain. 

“HasMySecretLeaked” is a non-public database with over 20 million data of hashed secrets and techniques leaked in public sources, together with GitHub.com. Customers can question the database by submitting a hashed model of their secret within the search console, and GitGuardian will search for their good matches with out revealing every other secrets and techniques or their places.

“Figuring out whether or not your ‘vaulted’ secrets and techniques have leaked publicly is only one API name away. We constructed a privacy-safe and safe course of that returns an unequivocal reply to the essential query: Has my secret leaked?” mentioned Eric Fourrier, co-founder and CEO of GitGuardian.

Beginning immediately, GitGuardian customers can use the ‘HasMySecretLeaked’ instrument straight by the ggshield command-line interface. Moreover, ggshield has plugins for retrieving secrets and techniques from instruments like HashiCorp Vault and AWS Secrets and techniques Supervisor, permitting customers to examine them for leaks in native environments. 

This function can be built-in into the GitGuardian Platform, which notifies safety groups if hardcoded secrets and techniques in organization-owned repositories, Slack workspaces, or Jira initiatives are by chance uncovered in public sources past the group’s management or visibility.

GitGuardian actively scans each public commit on GitHub to establish potential leaks of delicate info, equivalent to API keys, database entry credentials, and developer secrets and techniques. In 2020, it detected 3 million uncovered secrets and techniques, and this quantity elevated to six million in 2021, with a bounce to 10 million in 2022.