Set up pre-commit Git hooks and catch hardcoded secrets before you push your work.
Act on high-fidelity alerts and empower your developers to remediate their own incidents.
Harden your CI/CD pipelines with automated secrets scanning and never deploy a secret again.
Each month more than 10K developers protect their code using GitGuardian and join the community.
I accidentally pushed a valid Slack Webhook URL into a github repository. In 5 minutes I got email from Slack and GitGuardian to warn me about the incident. That's great! 👏
👀 Finding secrets in Docker containers @GitGuardian scanned ~2K public containers, and found secrets in ~7% Pro tip: Use the Docker manifest file to focus on layers where either files are manually added or copied, or environment variables are modified
@GitGuardian Thanks for your help in keeping @dolibarr and @dolicloud safer.
@GitGuardian Great way to discover public repos with sensitive code its a cool way to guide your repos #100DaysOfCode #coding
Rewriting your git history, removing files permanently [cheat sheet included]
Because git keeps a history of everything, it’s not often enough to simply remove the secret or file, commit, and push: we might need to do a bit of deep cleaning.
How to improve your Docker containers security [cheat sheet included]
Containers are no security devices. That's why we've curated a set of easily actionable recommendations to improve your Docker containers security. Check out the one-page cheat sheet.
GitGuardian is now #1 ranking app in the Security Category on the GitHub Marketplace
Today is a great day for code security! GitGuardian has just launched on the GitHub Marketplace, and to top it all off, we are ranked 1st in the Security Category. We are thankful to the 100k+ devs