Part of MANTIS Control

Secrets don't belong in code

Detect exposed API keys, tokens, passwords, and credentials before they become incidents. Scan repositories, containers, and configurations continuously.

secrets-scan-results.log
// src/config/aws.ts — line 24
const accessKey = "AKIA****████████████3F7Q";
HIGH — AWS Access Key detected in source code
Pattern: aws_access_key_id · Confidence: verified · First seen: 3 commits ago

What we detect

Hundreds of detection patterns for credentials that should never be in your codebase.

API Keys & Tokens

AWS, GCP, Azure, Stripe, GitHub, and dozens more provider patterns. Detects both active and revoked credentials.

SSH Keys & Certificates

Private keys, PEM files, and TLS certificates that should never leave secure storage.

Database Credentials

Connection strings, passwords, and database URIs embedded in application code and config files.

Environment Variables

Hardcoded secrets in .env files, Docker configs, and CI/CD pipeline definitions.

Where we look

Repositories
Container Images
Config Files
CI/CD Pipelines

Find what's exposed

Stop leaked secrets before attackers find them. Continuous scanning across your entire development lifecycle.

Start Free