detect-secrets icon indicating copy to clipboard operation
detect-secrets copied to clipboard

An enterprise friendly way of detecting and preventing secrets in code.

Results 130 detect-secrets issues
Sort by recently updated
recently updated
newest added

* **I'm submitting a ...** - [ ] bug report - [x] feature request * **What is the current behavior?** Only the lines commented with `# pragma: allowlist secret` and...

pending

* **I'm submitting a ...** As the project requirement we need to suppress the pem file for testing purpose. but no option allowed as such. * **What is the current...

triaged
request
P4

A potential secret is uniquely identified by three main properties: `filename, secret_hash, type`. Since `line_number` is not included this means we will only track a single potential secret in a...

* **Please check if the PR fulfills these requirements** - [x] Tests for the changes have been added - [ ] Docs have been added / updated - [x] All...

During audit, to get the raw secret value (for highlighting the secret) each file is re-scanned using every plugin, the hashes of the resulted secrets are then compared to the...

We had a secret referencing a file in the secrets baseline, and then that file was deleted, the next time detect-secrets (v1.2.0) ran, it crashed with: > FileNotFoundError: [Errno 2]...

needs more info
bug
P3

Currently `detect-secrets` considers `secretName` values in Kubernetes manifests as secrets, whereas they are actually merely names of the secrets. Also looks like line numbering gets messed up with multi-line scalar...

triaged
enhancement

I'm running `detect-secrets` on the following file (these are fake values): ``` env: PASSWORD: dY^5Ke76gdSiF OPSGENIE_API_KEY: oov9e5e9-3ccb-20c3-1097-74gyye7tx42q OPSGENIE_API_KEY_URL: https://api.opsgenie.com/v1/json/cloudwatch?apiKey=182663ax-3ccb-20c3-1097-3ol15d0wfu45 SLACK_WEBHOOK: https://hooks.slack.com/services/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 SLACK_API_KEY: xoxb-8825133122-0721161319009-2cmV8RhmMaFzb7NyFjXZNfgO OKTA_CLIENT_ID: cjjg9h0C61FPeOmmmAmz ANODOT_TOKEN: uvqcblfxi1d3ohvwjftgb59e3mba1x98 GITHUB_TOKEN: 1mlcyz92suir2qzfimaeekzb1goo5lveam15hebm ```...

help wanted
triaged
bug

When running detect-secrets audit against a baseline created with a custom filter, I get a python error ``` @ detect-secrets audit .secrets.baseline Traceback (most recent call last): File "/home/matthewh/.local/lib/python3.10/site-packages/detect_secrets/core/plugins/initialize.py", line...

good first issue
triaged
bug
P4

Hello Team, When I tried to scan the git repo the following information was not detected by the detect-secrets tool. The following terraform code details are given below. variable "sys_password"...

needs more info
bug
P4