🤫 Don't leak your secrets

A new Semgrep ruleset to detect leaked secrets

Update: in 2023 we introduced Semgrep Secrets which includes semantic analysis, improved entropy analysis, and validation for detecting secrets with high precision in developer workflows. Learn more →

Semgrep users often ask about scanning code for secrets—passwords, API keys, GitHub personal access tokens (PATs), etc. Good news: you can now easily scan your source code for secrets using a new ruleset, as well as easily write custom secret-scanning rules tailored to your project and environment.

Secrets can be leaked in various file formats. To detect them, Semgrep has JSON support, alpha YAML support, and an experimental generic matching mode. This means Semgrep can scan many file types beyond the programming languages it already supports.

This new ruleset includes 38 rules specifically designed for secret detection. You can run a quick scan on your code using:

semgrep --config "p/secrets"

If you don’t already have Semgrep installed, here’s a Docker command you can run to scan your code using the ruleset:

docker run --rm -v "${PWD}:/src" returntocorp/semgrep --config p/secrets

There’s more than just API key and hardcoded password detection, too: the rules also cover webhook URLs, HTTP basic auth params, Slack tokens, PGP and OpenSSH private keys, plus other things you don’t want checked into version control.

With Semgrep’s simple syntax, it’s easy to extend any of these rules to fit the custom needs of your organization. You can also use Semgrep’s composition or filtering to fine-tune the rules (often to reduce false-positives) or find something that is not a secret. For example, you can exclude results from a file’s integrity checksum using pattern-not-regex, or entirely ignore a rule on specific files/paths by using the paths: key.

Secret detection can be a bit noisy by nature, so we recommend running these rules in an audit mode. This shows findings in the Semgrep App’s dashboard and sends email or Slack notifications, but doesn’t block the build when secrets are detected. As you examine your results, you can iterate on the rules so they find only the secrets you care about.

To use the ruleset in such a workflow, simply log in to the Semgrep App and then:

Add the secrets ruleset to a new policy (or add to an existing policy):

Make sure the policy is not blocking:

Add the policy to a project:

Then enable viewing of non-blocking results in the dashboard overview:


Semgrep Logo

Semgrep lets security teams partner with developers and shift left organically, without introducing friction. Semgrep gives security teams confidence that they are only surfacing true, actionable issues to developers, and makes it easy for developers to fix these issues in their existing environments.

Find and fix the issues that matter before build time

Semgrep helps organizations shift left without the developer productivity tax.

Get started in minutesBook a demo