Application Security for Secret Detection
Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle. Task: Secret Detection
Browse 49 security tools
FEATURED
- Home
- Categories
- Application Security
- Secret Detection
USE CASES
AI-powered AppSec platform for code, supply chain, secrets & DAST.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
ASPM platform for tracking app security risks from development to deployment
IaC scanner detecting misconfigs, vulnerabilities & policy violations in templates.
DAST scanner for web apps & APIs with CI/CD integration & 15k+ test cases.
Continuous secret scanning and leak detection tool with precommit checks
Binary code analysis platform for software supply chain security and SBOM gen.
Credential verification service that validates leaked secrets for liveness
Analyzes leaked secrets to reveal ownership, access scope, and permissions
AI-powered secret detection tool for real-time credential scanning in code
Detects API keys, passwords, and tokens in code with AI-based false positive filtering.
AI-powered automated security code reviews for pull requests
Prevents secrets & sensitive data leaks in code at source
Scans source code repositories for exposed secrets and sensitive data
Detects hardcoded secrets in code using semantic analysis & validation
Code security platform for AI-generated and traditional code with runtime intel
Software supply chain security platform using binary analysis for threat detection
Cloud platform for automated AST with SAST, SCA, and DAST capabilities
Scans and detects hardcoded secrets across SDLC and dev tools
ASPM platform providing visibility, prioritization, and remediation from code to cloud
Continuous AppSec testing platform with zero-touch provisioning for CI/CD
Detects secrets and credentials in code using AI/ML and Code Property Graph
Detects, validates, and remediates secrets in code and pipelines
App security testing platform with SAST, SCA, secrets detection, and IaC scanning
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox