From pattern-based scanner to Credential Intelligence Platform
Secrets leak. We find them before attackers do.
A comprehensive stack evolving from pattern detection to AI-powered credential intelligence
API for AI assistants to check code before suggesting. "Don't let Copilot suggest leaked secrets"
Pre-index all public repos with hashes/embeddings. When breach happens β instant cross-reference
Check against HIBP, breach collections. "This password appeared in 847 breaches"
Actually try credentials in sandbox. Zero false positivesβevery alert is verified
Replace 58 regex patterns with learned similarity. Detects NEW formats without pattern updates
140 tests passing, 82.9/100 truth-manifesto. Production-ready foundation
// Must add new pattern for sk_prod_
/sk_live_[a-zA-Z0-9]{24}/
/sk_test_[a-zA-Z0-9]{24}/
// Manual maintenance forever
train(["sk_live_abc123...", "sk_test_xyz..."]);
// 5 examples
detect("sk_prod_newformat...");
// Works! Never seen this format.
| Metric | Without Verification | With Verification |
|---|---|---|
| Alerts | 50 alerts | 3 verified alerts |
| False Positives | 96% | 0% |
| Team Response | Ignores alerts | Every alert is actionable |
When a secret is verified working, an AI agent explores blast radius: What permissions? What data is accessible? What's the worst case exploit?
Cross-reference against HaveIBeenPwned, breach collections, and historical leak databases.
Password: Welcome123!
βββ Found in: 847 breaches
βββ First seen: LinkedIn 2012
βββ Rank: #1,247 most common password
βββ Risk: CRITICAL - rotate immediately
Continuously clone all public GitHub. Store hashes and embeddings (not actual secrets). When breach happens:
-- Instant query, pre-computed
SELECT repo, file, secret_hash
FROM global_index
WHERE secret_hash IN (SELECT hash FROM breach_data)
OR embedding <-> breach_embedding < 0.1;
-- Results in milliseconds, not hours
AI coding assistants trained on GitHub. GitHub contains leaked secrets. AI might suggest code WITH real leaked secrets. The solution:
POST /v1/check
{
"code": "const AWS_KEY = 'AKIAIOSFODNN7EXAMPLE';",
"context": "code_generation"
}
RESPONSE:
{
"safe": false,
"reason": "Exact match to AWS key leaked in 2023 breach",
"suggested_fix": "const AWS_KEY = process.env.AWS_ACCESS_KEY_ID;"
}
Integration targets: GitHub Copilot β’ Claude (via MCP) β’ Cursor β’ CodeWhisperer β’ Replit β’ CodeSandbox β’ StackBlitz
| Feature | GitGuardian | TruffleHog | YouSure π¦ |
|---|---|---|---|
| Pattern detection | β | β | β |
| Entropy detection | β | β | β |
| Embedding-based | β | β | β |
| Active verification | Partial | --verify flag | Full sandbox |
| Breach correlation | Enterprise only | β | β |
| Global index | β | β | β |
| AI safety API / MCP | β | β | β |