git-secrets scans commits, commit messages, and --no-ff merges to prevent adding secrets into your git repositories. If a commit, commit message, or any commit in a --no-ff merge history matches one of your configured prohibited regular expression patterns, then the commit is rejected. Installing git-secrets - git-secrets must be placed somewhere in your PATH so that it is picked up by git when running git secrets. *nix (Linux/macOS) You can use the install target of the provided Makefile to install git secrets and the man page. You can customize the install path using the PREFIX and MANPREFIX variables. make install Windows Run the provided install script.
Common questions about git-secrets including features, pricing, alternatives, and user reviews.
git-secrets is Prevents you from committing passwords and other sensitive information to a git repository. It is a Application Security solution designed to help security teams protect their infrastructure.
git-secrets is a free Application Security tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/awslabs/git-secrets/ for download and installation instructions.
Popular alternatives to git-secrets include:
Compare these tools and more at https://cybersectools.com/categories/application-security
SAST tool that detects logical flaws and business logic vulnerabilities
AI-native SAST tool providing contextual code security analysis in pull requests
Automated vulnerability remediation tool that fixes code security issues