Organizations who have development teams are very likely to have company secrets (API keys, tokens, password) end up on public GitHub. We can evaluate this exposure. How?
Receive a report with their GitHub footprint and our findings. See the report with mock data.
Developers who mentioned their company name on their GitHub profile, or use their company email address when pushing code publicly on GitHub.
All activity on GitHub is linked to a commit email. We can tie such commit emails to GitHub accounts, and hence monitor that accountʼs activity.
Secrets are digital authentication credential granting access to systems or data. These are most commonly API keys or usernames and passwords.
Percentage of secrets leaks for each category (eg. Private key, Version control platform, Cloud provider, Messaging system, Data storage, etc.).
Developers from their company's perimeter who have leaked at least one secret.
A Public Event occurs when a private repository is made public. Such an event is sensitive as it discloses the entire history of a repository, where sensitive data could be found.
Commits that mention your company domain in the committed code.
Secrets that can still be exploited by persons with malicious intent.
Secrets that were published inside a file that is sensitive in itself, such as a configuration file.
Secrets that can no longer be found on GitHub, but have been leaked and can be found in GitHub archives.
Our secrets detection engine has been running in production since 2017, analyzing billions of commits coming from GitHub. The algorithms and detectors constantly train against a dataset of %dscb% billions commits. The latest State of Secrets Sprawl 2023 reveals 10 million new secrets occurrences were exposed on GitHub in 2022. That's a 67% increase compared to 2021. And we are able to tell you how many leaks are tied to your company by first identifying your developers active on GitHub.
GitGuardian has absolutely supported our shift-left strategy. We want all of our security tools to be at the source code level and preferably running immediately upon commit. GitGuardian supports that. We get a lot of information on every secret that gets committed, so we know the full history of a secret.
Submit the request form
Have a call with the GitGuardian team to review the results
Schedule a call with your client or prospect and GitGuardian for an overview and demo
Receive “Deal Registration” on any opportunity that comes from the call