- Serverless tool that detects secrets and passwords in your pull requests - one file at a time. https://github.com/auth0/repo-supervisor 24 comments coding
Linking pages
- Huginn: An Open-Source, Self-Hosted IFTTT - DZone Web Dev https://dzone.com/articles/huginn-an-open-source-self-hosted-ifttt 52 comments
- Auditing Bitbucket Server Data for Credentials in AWS | Sourced Group https://www.sourcedgroup.com/blog/auditing-bitbucket-server-data-credentials-in-aws 11 comments
- GitHub - anshumanbh/git-all-secrets: A tool to capture all the git secrets by leveraging multiple open source git searching tools https://github.com/anshumanbh/git-all-secrets 8 comments
- Yelp's Secret Detector: Preventing Secrets in Source Code https://engineeringblog.yelp.com/2018/06/yelps-secret-detector.html 7 comments
- Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters | by Bharath | Appsecco https://blog.appsecco.com/static-analysis-of-client-side-javascript-for-pen-testers-and-bug-bounty-hunters-f1cb1a5d5288 4 comments
- Introducing Radar API: Detect Credentials & Secrets in Code via Machine Learning | by Nightfall AI | Medium https://medium.com/@watchtowerai/introducing-radar-api-detect-credentials-secrets-in-code-via-machine-learning-fe402b818bf1 3 comments
- DevSecOps explained — Venture Capital perspective | by Kris Przybylak | Investor @ Inovo.vc | Inside Inovo | Medium https://medium.com/inside-inovo/devsecops-explained-venture-capital-perspective-cb5593c85b4e 1 comment
- Detecting secrets in source code. We’re open-sourcing a new security tool… | by @radekk | Auth0 Engineering https://auth0.engineering/detecting-secrets-in-source-code-bd63b0fe4921 0 comments
- GitHub - jesusprubio/awesome-nodejs-pentest: Delightful Node.js packages useful for penetration testing, exploiting, reverse engineer, cryptography ... https://github.com/jesusprubio/awesome-nodejs-pentest 0 comments
Linked pages
Related searches:
Search whole site: site:github.com
Search title: GitHub - auth0/repo-supervisor: Scan your code for security misconfiguration, search for passwords and secrets.
See how to search.