This component uses AlpineJS to render elements. To update the testimonial text, edit the Testimonials Data property, which contains a list of testimonies. Change the category to modify the name of each tab. To add more testimonial cards, insert a new data object in the same format within the testimonials list (remember to separate them with a coma), or modify the existing data to maintain the same number of cards per tab.
This component requires AlpineJS. If it's not already included in another component, add it to the alpine-imports slot. Component name: Alpine.js - Imports + Scripts + CS
GitGuardian has absolutely supported our shift-left strategy. We want all of our security tools to be at the source code level and preferably running immediately upon commit. GitGuardian supports that. We get a lot of information on every secret that gets committed, so we know the full history of a secret.
This component uses AlpineJS to render elements. To update the tab and tab content, edit the JS Data property, which contains a list of tabs with their content. Change the naem, image, title and description accordingly. To add more list items , insert a new data object in the same format within the featuresList, or modify the existing data to maintain the same number of items per tab.
This component requires AlpineJS. If it's not already included in another component, add it to the alpine-imports slot. Component name: Alpine.js - Imports + Scripts + CS
Our SaaS solution monitors both your company's official open-source repositories and the personal repos of the developers that work for you.
Monitor
Description
Every time one of the developers inside your perimeter commits a secret, we detect it in minutes and immediately notify you.
This Scrollable Tabs component has two slots:
Each tab link should be paired with its corresponding content item (1 link → 1 tab content).
To set up a tab:
#
, in the Scrollable Tabs __ Menu Link property LINK-TO-PANE-BY-ID. E.g: #discover-and-inventoryTo remove a tab, delete both its Menu Link and corresponding Content Item.
GitGuardian tackles the core industry challenge of NHI and vault sprawl by providing clear visibility across your ecosystem. Our platform delivers a comprehensive secrets inventory, ensuring a single source of truth for secrets spread across code, dev tools, vaults, and other third-party systems.
Gain full context around secrets, including permissions, owners, accesses, and associated consumer services. GitGuardian offers detailed insights into each secret's scope, helping you understand its potential impact and vulnerabilities across your infrastructure.
By scanning repositories and productivity tools such as Slack, Jira, and Confluence, GitGuardian automatically detects illegitimate usage of secrets, ensuring timely remediation to minimize the attack surface.
Through our partnership with CyberArk, Hashicorp, etc GitGuardian automates the discovery, rotation, and remediation of secrets, including those which were not stored in the Secrets Manager. This enables secure, scalable, comprehensive secrets management.
# Here, secrets.txt is a text file containing a list of 3 secrets values.
$ ggshield hmsl check secrets.txt
Collecting secrets...
Collected 3 secrets.
Querying HasMySecretLeaked...
97 credits left for today.
Found 2 leaked secrets.
> Secret 1
Secret name: "ggt***********kbf"
Secret hash: "e9b39209f72228f30b60c19493a3f756ac97dc02ae7f52db2a3abbe3c3269339"
Distinct locations: 1
First occurrence:
URL: "https://github.com/GitGuardian/ggshield/commit/394b160c36f42aee3b0d4b84ed70eb58e646046f"
> Secret 2
Secret name: "ggt***********jfa"
Secret hash: "d775db0302080c1b7516109e929dd4b214a0f353ed3b66ff2e56c47d55a102ed"
Distinct locations: 1
First occurrence:
URL: "https://github.com/GitGuardian/ggshield/commit/ada1b96da53c23f1dfe956fff902c33ff55afd15"
# Here, secrets.txt is a text file containing a list of 3 secrets values.
$ ggshield hmsl fingerprint secrets.txt
payload.txt and mapping.txt files have been written.
Prepared 3 secrets.
# Here, payload.txt is a text file containing a five-character long prefix of each hashed value of the secrets initially provided in secrets.txt (see previous command). Only this file is shared with GitGuardian.
$ ggshield hmsl query payload.txt > results.dump
97 credits left for today.
Audited 3 secrets in total for leaks.
# Here, results.dump is the file returned by GitGuardian and contains potential matches of the audited secrets (see previous command). All the content of results.dump is encrypted and can only be decrypted locally in the user’s environment.
$ ggshield hmsl decrypt results.dump
Found 2 leaked secrets.
> Secret 1
Secret name: "ggt***********kbf"
Secret hash: "e9b39209f72228f30b60c19493a3f756ac97dc02ae7f52db2a3abbe3c3269339"
Distinct locations: 1
First occurrence:
URL: "https://github.com/GitGuardian/ggshield/commit/ada1b96da53c23f1dfe956fff902c33ff55afd15"
> Secret 2
Secret name: "ggt***********jfa"
Secret hash: "d775db0302080c1b7516109e929dd4b214a0f353ed3b66ff2e56c47d55a102ed"
Distinct locations: 1
First occurrence:
URL: "https://github.com/GitGuardian/ggshield/commit/42f8f8a16deb779fbf7e67332f24ad32f3572459"