Securelog Scan is a tool designed to scan your codebase for potential secrets like API keys, tokens, and other sensitive information. It supports scanning .env
files, parsing .git
commit history, and analyzing all files line by line.
It takes 2min. Install, add, deploy.
Need Secret scanning in other places?
.git
commit history.To use sls
,
yarn global add securelog-scan # npm i -g securelog-scan
docker pull ghcr.io/onboardbase/securelog-scan:main
sls --version
To scan your codebase, simply run:
sls scan --dir <directory>
You can also scan your codebase just by specifying the public URL (only github, gitlab & bitbucket URLs for now)
sls scan --url https://github.com/username/my-public-repository
Note: Securelog scan automatically defaults to
$cwd
if--dir
flag is not provided
You can exclude specific folders or file extensions using the --exclude
option:
sls scan --dir <directory> --exclude <folders> --commits <100> --verify <false> -- mask <true>
--exclude <folders>
: Comma-separated list of folders to exclude from scanning.--commits <number>
: Number of most recent commits to scan (defaults to 100 most recent commits).--mask <boolean>
: Whether secret should be masked or not (default is false)--verify <boolean>
: Specify this if you want secrets to be verified against their service providerTo scan only files and lines that have been changed in recent commits (useful in CI pipelines to only scan code changes):
sls scan --changed
You can specify a path to a configuration file using the --config
option. This file allows you to customize regex patterns and exclusion lists:
sls scan --config <path_to_config_file>
--config <path_to_config_file>
: Path to the config file.Here is an example of what your config file might look like:
Note: Adding custom regex patterns, paths or extensions to exclude is optional and should be used for your specific need only. By default, these have already been added to the library.
detectors:
# paystack:
# regex: "\\bsk\\_[a-z]{1,}\\_[A-Za-z0-9]{40}\\b"
# keywords: ["paystack"]
# detectorType: "Paystack"
# mailgun:
# regex:
# "Original Token": "\\b([a-zA-Z-0-9]{72})\\b"
# "Key-Mailgun Token": "\\b(key-[a-z0-9]{32})\\b"
# "Hex Mailgun Token": "\\b([a-f0-9]{32}-[a-f0-9]{8}-[a-f0-9]{8})\\b"
# keywords: ["mailgun"]
# detectorType: "Mailgun"
# Agora:
# regex: "\\b([a-z0-9]{32})\\b"
# keywords: ["agora"]
# detectorType: "Agora"
# group: ["agora"] // sorrounding groups to reduce false positives (mostly for generic secret types)
exclude:
paths:
# - "node_modules"
# - "dist"
# - ".git"
extensions:
# - ".png"
# - ".jpg"
# - ".log"
sls scan --dir ./my-project --exclude dist,node_modules --config ./config.yml --commits 100
sls scan-string --rawValue "raw secret values"
A good usecase for this feature would be for LLMs, securelog can help you parse your inputs before sending to LLMs to make sure you are not sending texts with actual secrets. Make a post request to this endpoint to try it out https://api.securelog.com/mask-secret
you can also scan from a file and write the contents of the file using the command below
sls scan-string --file "path/to/file" --updateFile # --updateFile will rewrite the contents of the file by masking secrets values inside the file
The scanner will output potential secrets found, including the following details:
To automatically run the secret scanning CLI before committing or pushing code, you can use Husky to manage Git hooks in your project.
First, install Husky as a development dependency:
npm install husky --save-dev
Initialize Husky to create a .husky
directory where the hooks will be managed:
npx husky install
Create a pre-commit hook to run the secret scanning CLI:
npx husky add .husky/pre-commit "sls scan --changed"
Or create a pre-push hook:
npx husky add .husky/pre-push "sls scan --changed"
Replace your-cli-command
with the actual name of your CLI tool.
To ensure Husky is set up automatically when installing dependencies, add the following to your package.json
:
"scripts": {
"prepare": "husky install"
}
After setting up the hooks, test them by attempting to make a commit or push in your repository. Husky will automatically run securelog scan, allowing or blocking the commit/push based on the scan results.
Securelog Scan allows you to run the to scan your codebase for secrets during CI processes. It provides flexibility for various configuration options such as excluding specific folders, limiting the number of commits to scan, and more.
name: Secret Scan
on:
push:
branches:
- main
pull_request:
jobs:
test:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Secret Scanning
uses: onboardbase/securelog-scan@main
with:
exclude: "node_modules,dist" # Comma-separated list of folders to exclude (optional)
commits: 100 # Number of recent commits to scan (optional)
config: ".securelog.yaml" # Optional path to a custom config file (optional)
changed: "true" # Set to "false" to scan entire repository instead of just files that was changed (optional)
mask: "true" # that is mask secret value e.g sk_******
verify: "true" # that is verify potential secrets against their service provider
securelog-scan:
image: ghcr.io/onboardbase/securelog-scan:latest
script:
- sls scan ${EXCLUDE:+ --exclude "${EXCLUDE}"} ${COMMITS:+ --commits "${COMMITS}"} ${CONFIG:+ --config "${CONFIG}"} ${CHANGED:+ --changed} ${VERIFY:+ --verify} ${MASK:+ --mask}
variables:
EXCLUDE: ""
COMMITS: ""
CONFIG: ""
CHANGED: ""
MASK: ""
VERIFY: ""
pipelines:
default:
- step:
name: Securelog Scan
image: ghcr.io/onboardbase/securelog-scan:latest
script:
- sls scan ${EXCLUDE:+ --exclude "${EXCLUDE}"} ${COMMITS:+ --commits "${COMMITS}"} ${CONFIG:+ --config "${CONFIG}"} ${CHANGED:+ --changed} ${VERIFY:+ --verify} ${MASK:+ --mask}
variables:
EXCLUDE: ""
COMMITS: ""
CONFIG: ""
CHANGED: ""
MASK: ""
VERIFY: ""
We have implemented various analyzers to help detect and analyze potential secrets within different types of services and platforms. Each analyzer is designed to handle specific types of secrets and configurations, ensuring that sensitive information is detected and managed appropriately. Below is an overview of the analyzers we have implemented
Analyzer | Command | Description |
---|---|---|
MongoDB | sls analyze mongodb --secret "<connection-string>" |
Inspects MongoDB connection strings, connects to the database, and retrieves information about collections, users, and databases. |
MySQL | sls analyze mysql --secret "<connection-string>" |
Inspects MySQL connection strings, connects to the database, and retrieves information about tables, databases, and user grants. |
PostgreSQL | sls analyze postgresql --secret "<connection-string>" |
Inspects PostgreSQL connection strings, connects to the database, and retrieves information about databases, tables, and user roles. |
GitHub | sls analyze github --secret "<api-key>" |
Inspects GitHub API keys, attempts to access user data, and retrieves information about user details and access scopes. |
GitLab | sls analyze gitlab --secret "<api-key>" |
Inspects GitLab API keys, attempts to access user and project data, and retrieves information about user roles and project visibility. |
Slack | sls analyze slack --secret "<api-token>" |
Inspects Slack API tokens, attempts to access workspace data, and retrieves information about channels, users, and workspace settings. |
To run an analyzer, use the following command:
sls analyze <analyzer> --secret "<api key or connection string>" # slack, mongodb, mysql, postgresql, github, gitlab,
To remove any detected secret from git history, use the following command:
sls git-rewrite --secrets "<secrets you will like removed from git history>"
Note: This command modifies your Git history, so you should force-push the cleaned branches to the remote repository after running this:
git push --force --all
git push --force --tags
Feel free to contribute to this project by opening issues or submitting pull requests.
This project is licensed under the Functional Source License. See the LICENSE file for more details.