Detect Code Leaks On Public GitHub With GitGuardian Honeytoken
When your private code becomes publicly visible, you want to know about it immediately. GitGuardian Honeytoken is a quick and easy way to add leakage detection to your repositories.
When your private code becomes publiclyÂ
visible, you want to know about it immediately. GitGuardian Honeytoken is a quick and easy wayÂ
to add leakage detection to your repositories. GitGuardian natively monitors all theÂ
commits on public GitHub for leaked secrets, meaning if one of your honeytokensÂ
gets pushed into a public repository, it will be triggered by our scans almostÂ
immediately, alerting you of the situation. You will get a detailed email informing youÂ
that it has been publicly exposed. You will see the name of the repository that it was foundÂ
in, along with a link to it. We also provide other vital information, which you can find inÂ
the GitGuardian Honeytoken Dashboard as well. In the Honeytoken list view in the dashboard, you can quickly identify and filter whichÂ
honeytokens have been exposed publicly. Clicking into the detail view will show youÂ
the event log, giving you the Timestamp, IP address, and user agent of who triggered it,Â
as well as what action they were trying to take. With the GitGuardian Honeytoken IP taggingÂ
rules, you will be able to quickly see which events were triggered by GitGuardian PublicÂ
Monitoring IP and which came from other users. Make sure you are keeping yourÂ
private code truly private by monitoring for public exposureÂ
with GitGuardian Honeytoken.