git-secrets scans commits, commit messages, and --no-ff merges to prevent adding secrets into your git repositories. If a commit, commit message, or any commit in a --no-ff merge history matches one of your configured prohibited regular expression patterns, then the commit is rejected.
Are you still using AWS Lab's git-secrets? Let's compare it to the best other options below. Maybe one of these AWS Lab's git-secrets alternatives will work on your device, too.
Audit git repos for secrets. Gitleaks provides a way for you to find unencrypted secrets and other unwanted data types in git source code repositories. As part of...
Gitrob is a tool to help find potentially sensitive files pushed to public repositories on Github. Gitrob will clone repositories belonging to a user or organization...
CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys.
Serverless tool that detects secrets and passwords in your pull requests - one file at a time.
Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets accidentally committed.
rules to identify files containing juicy information like usernames, passwords etc.
detect-secrets is an aptly named module for (surprise, surprise) detecting secrets within a code base.
Add your reviews & share your experience when using AWS Lab's git-secrets to the world. Your opinion will be useful to others who are looking for the best AWS Lab's git-secrets alternatives.
Popular Alternatives
iOS Alternatives
Android Alternatives
Copyright © 2021 TopAlter.com
Sites we Love: AnswerBun, MenuIva, UKBizDB, Sharing RPP