Gartner®: Avoid Mobile Application Security Pitfalls

GET REPORT

Gartner®: Avoid Mobile Application Security Pitfalls

GET REPORT

Detect Code Leaks On Public GitHub With GitGuardian Honeytoken

When your private code becomes publicly visible, you want to know about it immediately. GitGuardian Honeytoken is a quick and easy way to add leakage detection to your repositories.

Video Transcript

When your private code becomes publicly  visible, you want to know about it immediately. GitGuardian Honeytoken is a quick and easy way  to add leakage detection to your repositories. GitGuardian natively monitors all the  commits on public GitHub for leaked secrets, meaning if one of your honeytokens  gets pushed into a public repository, it will be triggered by our scans almost  immediately, alerting you of the situation. You will get a detailed email informing you  that it has been publicly exposed. You will see the name of the repository that it was found  in, along with a link to it. We also provide other vital information, which you can find in  the GitGuardian Honeytoken Dashboard as well. In the Honeytoken list view in the dashboard, you can quickly identify and filter which  honeytokens have been exposed publicly. Clicking into the detail view will show you  the event log, giving you the Timestamp, IP address, and user agent of who triggered it,  as well as what action they were trying to take. With the GitGuardian Honeytoken IP tagging  rules, you will be able to quickly see which events were triggered by GitGuardian Public  Monitoring IP and which came from other users. Make sure you are keeping your  private code truly private by monitoring for public exposure  with GitGuardian Honeytoken.