Leaktopus is a tool to keep your source code under control.
ORGANIZATION-NAME.com. Currently supports:
In addition to the basic personal access token option, Leaktopus supports Github App authentication. Using Github App is recommended due to the increased rate limits.
GITHUB_USE_APP=TrueGITHUB_APP_IDGITHUB_INSTALLATION_ID – The installation id can be found in your app installation.GITHUB_APP_PRIVATE_KEY_PATH (defaults to /app/private-key.pem)docker-compose.yml for an example). ./leaktopus_backend/private-key.pem:/app/private-key.pem* Note that GITHUB_ACCESS_TOKEN will be ignored if GITHUB_USE_APP is set to True.
If you wish to update your Leaktopus version (pulling a newer version), just follow the next steps.
The built-in heuristic engine is filtering the search results to reduce false positives by:
OpenAPI documentation is available in http://{LEAKTOPUS_HOST}:8000/apidocs.
| Service | Port | Mandatory/Optional |
|---|---|---|
| Backend (API) | 8000 | Mandatory |
| Backend (Worker) | N/A | Mandatory |
| Redis | 6379 | Mandatory |
| Frontend | 8080 | Optional |
| Elasticsearch | 9200 | Optional |
| Logstash | 5000 | Optional |
| Kibana | 5601 | Optional |
The above can be customized by using a custom docker-compose.yml file.
As for now, Leaktopus does not provide any authentication mechanism. Make sure that you are not exposing it to the world, and doing your best to restrict access to your Leaktopus instance(s).
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…