Detect Code Leaks On Public GitHub With GitGuardian Honeytoken
When your private code becomes publicly visible, you want to know about it immediately. GitGuardian Honeytoken is a quick and easy way to add leakage detection to your repositories.
When your private code becomes publicly
visible, you want to know about it immediately. GitGuardian Honeytoken is a quick and easy way
to add leakage detection to your repositories. GitGuardian natively monitors all the
commits on public GitHub for leaked secrets, meaning if one of your honeytokens
gets pushed into a public repository, it will be triggered by our scans almost
immediately, alerting you of the situation. You will get a detailed email informing you
that it has been publicly exposed. You will see the name of the repository that it was found
in, along with a link to it. We also provide other vital information, which you can find in
the GitGuardian Honeytoken Dashboard as well. In the Honeytoken list view in the dashboard, you can quickly identify and filter which
honeytokens have been exposed publicly. Clicking into the detail view will show you
the event log, giving you the Timestamp, IP address, and user agent of who triggered it,
as well as what action they were trying to take. With the GitGuardian Honeytoken IP tagging
rules, you will be able to quickly see which events were triggered by GitGuardian Public
Monitoring IP and which came from other users. Make sure you are keeping your
private code truly private by monitoring for public exposure
with GitGuardian Honeytoken.