Your secrets are in your code.

That AWS key on line 47 just became everyone's problem. SecretScan catches hardcoded API keys, tokens, passwords, and private keys before they reach your repo.

$ clawhub install secretscan click to copy
$ secretscan scan
🔐 SecretScan v1.0.0
 
Scanning 42 files...
 
  src/config/aws.ts:12
    ✗ [SK-001] AWS access key detected (AKIA...)
    → Use environment variables or AWS Secrets Manager
 
  src/api/stripe.js:8
    ✗ [SK-005] Stripe secret key hardcoded (sk_live_...)
    → Move to environment variables, never commit live keys
 
  src/utils/auth.py:31
    ✗ [PW-003] Password assigned as string literal
    → Use a secrets vault or environment variable
 
  .env.example:5
    ✗ [CL-002] Real AWS secret key in example file
    → Use placeholder values in example files
 
  ───────────────────────────────────────
  Score: 28/100 (Grade: F)  |  8 critical  3 high  1 medium

One leaked key can cost you everything.

Hardcoded secrets in source code cause breaches, account takeovers, and six-figure cloud bills. It takes seconds for bots to find a leaked AWS key on GitHub. SecretScan catches every credential before it leaves your machine.

100+
Detection patterns
6
Secret categories
All
Languages supported
100%
Local scanning

Everything you need to stop secret leaks

🔑

API Key Detection

Detects hardcoded API keys from AWS, GCP, Azure, Stripe, Twilio, SendGrid, and dozens more providers with high-confidence pattern matching.

🔒

Password Scanner

Finds passwords assigned as string literals, default credentials, and connection strings with embedded auth. No more "password123" in production.

🗝️

Private Key Finder

Catches RSA, SSH, PGP, and TLS private keys committed to source. Detects PEM blocks, PKCS8 markers, and key file content patterns.

☁️

Cloud Credential Hunter

Scans for AWS access keys, GCP service account JSON, Azure connection strings, and cloud-specific tokens across every file in your repo.

🎫

JWT Secret Detector

Identifies hardcoded JWT signing secrets, HMAC keys, and OAuth client secrets. Catches the tokens that protect your entire auth system.

🧮

Entropy Analysis

Uses Shannon entropy scoring to detect high-randomness strings that look like secrets, even when they don't match known provider patterns.

How SecretScan compares

Feature git-secrets truffleHog detect-secrets gitleaks Talisman SecretScan
Pattern count ~10 ~80 ~30 ~120 ~20 100+
Entropy analysis Shannon + custom
Pre-commit hooks Lefthook native
Git history scan Deep audit
SARIF output
Baseline allowlisting Per-team policies
Remediation hints Per-finding fixes
Offline / local

Simple, transparent pricing

Start scanning for free. Upgrade when your secrets demand it.

Free
$0
  • 5 files per scan
  • Basic pattern matching
  • Single directory scanning
  • Community support
Install Free
Team
$39/mo
  • Everything in Pro
  • Team policy enforcement
  • SARIF output for CI
  • Baseline allowlisting
  • Custom pattern rules
  • Priority support

Get notified about updates

No spam. One email per week max. Unsubscribe anytime.

Leaked secrets are the #1 cause of cloud breaches

Install SecretScan in 30 seconds. Catch every hardcoded key, token, and password before it hits your repo.

$ clawhub install secretscan click to copy