Organisations struggle to scan for leaked secrets in ALL of their repos. It’s easy to scan one repo, but time consuming and tedious to scan all of them.
SecretMagpie is a secret detection tool that hunts out all the secrets hiding in ALL your repositories.
It supports finding repos in Github, Gitlab, Azure DevOps (ADO), Bitbucket and the local file system.
Given an auth token, it will:
By making use of the opensource tools Trufflehog 🐷 and Gitleaks, SecretMagpie can highlight a variety of different secrets and ensure that nothing is missed!
We plan on adding more tools soon, providing even wider coverage.
The easiest approach is to use Docker…
We’ve kept things nice and simple and bundled everything into a Docker container to enable you to start finding secrets as soon as possible.
Simply run one of the following commands to get started: for github, gitlab or azuredevops
docker run punksecurity/secret-magpie <github/gitlab/azuredevops> --org 'organisation name' --pat 'personal access token'
or for bitbucket
docker run punksecurity/secret-magpie bitbucket --workspace 'workspace name to scan' --username 'your username' --password 'your application password'
or for the local filesystem
docker run -v /local/path/to/repos/:/repos punksecurity/secret-magpie filesystem --path /repos
For more information click here.
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open…
While file extensions in Linux are optional and often misleading, the file command helps decode what a…
The touch command is one of the quickest ways to create new empty files or update timestamps…
Handling large numbers of files is routine for Linux users, and that’s where the find command shines.…
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy…
Creating directories is one of the earliest skills you'll use on a Linux system. The mkdir (make…