Want to protect your software supply chain from attacks?

Learn how!

Checkmarx One

Secrets Detection

Minimize risk by quickly identifying and eliminating sensitive credentials that may have been unintentionally exposed.

secrets_detection_hero

Reduce Security Risks by Eliminating Exposed Secrets

Automatically detect exposed credentials, API keys, encryption keys, certificates, tokens, private URLs, and other sensitive data.

Powerful Secrets Detection

powerful_secrets_detection_2x

Checkmarx accurately identifies 170+ different types of login credentials, access tokens, encryption keys, API keys, SSH keys, webhook URLs, and other unsecured sensitive information.

Flexible Manual Scan Initiation

flexible_manual_scan_initiation_2x

Scanning for exposed secrets can be initiated on demand via integrated IDE, CLI, API, and the Checkmarx One UI.

Automatic Scanning Triggers

automatic_scanning_triggers

Scanning for secrets can be initiated automatically at specific SDLC stages via SCM integration (e.g., pull request, build).

Developer-Friendly Workflows

developer_friendly_workflows_2x

Developers can initiate scans for exposed secrets, review results, and remediate exposed secrets directly within their IDE environment.

Comprehensive & Actionable Reporting

comprehensive_actionable_reporting_2x

Detailed reporting includes insights on detected secrets to provide clear and actionable guidance to efficiently address risks.

  • Powerful Secrets Detection

    Checkmarx accurately identifies 170+ different types of login credentials, access tokens, encryption keys, API keys, SSH keys, webhook URLs, and other unsecured sensitive information.

  • Flexible Manual Scan Initiation

    Scanning for exposed secrets can be initiated on demand via integrated IDE, CLI, API, and the Checkmarx One UI.

  • Automatic Scanning Triggers

    Scanning for secrets can be initiated automatically at specific SDLC stages via SCM integration (e.g., pull request, build).

  • Developer-Friendly Workflows

    Developers can initiate scans for exposed secrets, review results, and remediate exposed secrets directly within their IDE environment.

  • Comprehensive & Actionable Reporting

    Detailed reporting includes insights on detected secrets to provide clear and actionable guidance to efficiently address risks.

powerful_secrets_detection_2x
flexible_manual_scan_initiation_2x
automatic_scanning_triggers
developer_friendly_workflows_2x
comprehensive_actionable_reporting_2x
Mid Page CTA Background

Keep your Secrets Secret with Checkmarx

Learn how leading enterprises use Checkmarx to help them quickly eliminate the threats of exposed secrets.

What’s in it for you

Easily Detect and Remediate Exposed Secrets

Minimize security risks and strengthen your security posture by ensuring that no unsecured secret credentials are making your organization vulnerable to attack.

I01

Keep Your Secrets Secret

Prevent the unintended exposure of sensitive credentials, tokens, keys, certificates, or URLs that can endanger your organization.

I02

Secure your Supply Chain

Make secrets leakage prevention a core component of your comprehensive software supply chain security (SSCS) strategy.

I03

Improve Regulatory Compliance

Avoid fines and reputational damage by fully meeting regulations that require organizations to safeguard sensitive data (e.g., GDPR, HIPAA, PCI DSS, SOX, FISMA, CCPA).

What Our Customers Say About Us

See why enterprises trust our approach to AppSec to secure their business-critical applications.

“Checkmarx One definitely checks all my boxes from a security standpoint and has a great interface that’s engaging and easy to use. Some of the solutions we considered were more complicated. With Checkmarx One, it’s easy to get right to the problem with little to no learning curve.”

“Incorporating Checkmarx’s technology has revolutionized our development culture. It’s more than just technology; it serves as the foundation of our security strategy, ensuring that our applications are secure by design.”

“The success of our AppSec program can be directly attributed to the tooling, processes and support provided by Checkmarx managed services. Our mission revolves around providing secure and compliant lottery and gaming applications and services to our clients around the globe, and with Checkmarx SAST, SCA and associated components enhanced by their stellar service support, we deliver on this promise with confidence and certainty.”

“After nearly nine years of using Checkmarx’s SAST, CGI’s journey has been one of seamless integration and consistent satisfaction. The last three years have been particularly smooth, reflecting the solution’s reliability and our successful partnership.”

“After reviewing the Checkmarx platform, I’m not sure how Veracode is able to exist while being at a similar price point.”

“Checkmarx’s execution is impressive; it’s brought all the products under one cloud platform.”

“By Far The Best AppSec Tooling Decision We Have Made!!”

“We were thrilled to find Checkmarx, which helped us improve the SLA for identifying and remediating risk, reduce risk and the number of vulnerabilities, and eliminate high- and medium-risk issues.”

“Checkmarx made security team and developers life easier.”

FAQ

What kind of exposed secrets are important to identify?

It is important to identify any private or sensitive information that could potentially be used in an attack or data breach. This includes credentials (such as usernames or passwords that can grant a user or system access to resources or services), API keys or tokens (unique identifiers to authorize access to an API or web service), private keys or encryption keys (such as those used to encrypt/decrypt sensitive data or secure communication protocols), certificates (codes used to establish trust between two entities, such as between a server and a client), and private endpoint/webhook URLs.

Where can exposed secrets be found?

Secrets can be exposed in a wide variety of places, including source code, configuration files (e.g., IaC files), CI/CD pipelines, developer productivity tools, collaboration tools, wikis, and generative AI tools. To minimize potential vulnerabilities, any secrets exposed in any non-private location must be identified, removed, and changed.

What makes a good secrets detection algorithm?

An effective secrets detection algorithm must exhibit high precision and high recall. High precision means a low number of false alerts. In other words, high precision means that a high percentage of identified secrets are actual secrets that are at risk of exposure. High recall means that a low number of secrets are missed. Given that even one undetected credential can introduce a large amount of risk, it is often considered preferable to have to investigate some false alerts to ensure that no real exposed secrets are overlooked.

What to do after a secret has been exposed?

Any time an exposed secret is discovered, it is advisable to immediately revoke/replace the secret to remove the risk of the secret being used in an attack or breach. This is especially important if the secret was exposed in a public platform (such as GitHub), because once posted it might never be possible to completely remove it. And, of course, do not repeat the mistake and include the new secret in an exposed manner.

How can the exposing of secrets be prevented?

There are many techniques that can prevent the exposure of secrets; when developers and DevOps professionals are aware of the dangers and these solutions, the incidence of exposed secrets should drop sharply. One example is storing secrets in environment variables or separate files instead of hardcoding them, and then using a .gitignore file to ensure that files containing secrets are not synced to a repository. Other possibilities are encrypting all secrets, using a dedicated secrets management tool, and implementing two-factor authentication (2FA) for any repositories that still might contain secrets. Of course, automated scanning technology can detect exposed secrets and prevent disaster when mistakes are made.

How does a secrets detection solution improve developer productivity?

Developers often forget to remove hard-coded credentials, keys, private webhook URLs, and other sensitive secrets from their code when completing a development task. Scanning for exposed secrets upon code commit, for example, automates the process of identifying any exposed secrets, freeing up developers to focus on core development tasks.

Checkmarx One

The Cloud-Native Enterprise Application Security Platform

Checkmarx One delivers a full suite of enterprise AppSec solutions in a unified, cloud-based platform that allows enterprises to secure their applications from the first line of code to deployment in the cloud.

Get everything your enterprise needs to integrate AppSec across every stage of the SDLC and build a successful AppSec program

Explore Checkmarx One Packaging & Pricing

Application Security Posture
Management (ASPM) Consolidated, correlated, prioritized insights to help your team manage risk

Code

AI Powered
  • SAST

    Conduct fast and accurate scans to identify risk in your custom code.

  • DAST

    Identify vulnerabilities only seen in production and assess their behavior.

  • API Security

    Eliminate shadow and zombie APls and mitigate API-specific risks.

Supply Chain

AI Powered
  • SCA

    Easily identify, prioritize, remediate, and manage open source security and license risks.

  • Malicious Package Protection

    Detect and remediate malicious or suspicious third-party packages that may be endangering your organization.

  • AI Security

    Built to accelerate AppSec teams and help developers secure applications from the first line of code.

  • Secrets Detection

    Minimize risk by quickly identifying and eliminating exposed secrets.

  • Repository Health

    Reduce security risks by health-scoring the code repositories used in your applications.

Cloud

AI Powered
  • Container Security

    Scan container images, configurations, and identify open source packages and vulnerabilities preproduction and runtime.

  • IaC Security

    Automatically scan your laC files for security vulnerabilities, compliance issues, and infrastructure misconfigurations.

Dev Enablement

  • Codebashing

    Secure code training to upskill your developers and reduce risk from the first line of code.

Services

  • Premium Support

    Maximize ROI with prioritized technical support, metrics monitoring, and operational assistance.

  • Premium Services

    Augment your security team with Checkmarx services to ensure the success of your AppSec program.

  • Maturity Assessment

    Assess the current state of your AppSec program, benchmark against peers, and get actionable next steps for improvement.

Dev Enablement

  • Codebashing

    Codebashing

    Secure code training to upskill your developers and reduce risk from the first line of code.

Unified Dashboard, Reporting & Risk Management

Application Security Posture
Management (ASPM)

Consolidated, correlated, prioritized insights to help your team manage risk

AI Powered

Code

  • SAST

    Static Application Security Testing (SAST)

    Conduct fast and accurate scans to identify risk in your custom code.

  • DAST

    Dynamic Application Security Testing (DAST)

    Identify vulnerabilities only seen in production and assess their behavior.

  • API Security

    API Security

    Eliminate shadow and zombie APls and mitigate API-specific risks.

Supply Chain

  • SCA

    Software Composition Analysis (SCA)

    Easily identify, prioritize, remediate, and manage open source security and license risks.

  • Malicious Package Protection

    Malicious Package Protection

    Detect and remediate malicious or suspicious third-party packages that may be endangering your organization.

  • AI Security

    AI Security

    Built to accelerate AppSec teams and help developers secure applications from the first line of code.

  • Secrets Detection

    Secrets Detection

    Minimize risk by quickly identifying and eliminating exposed secrets.

  • Repository Health

    Repository Health

    Reduce security risks by health-scoring the code repositories used in your applications.

Cloud

  • Container Security

    Container Security

    Scan container images, configurations, and identify open source packages and vulnerabilities preproduction and runtime.

  • IaC Security

    IaC Security

    Automatically scan your laC files for security vulnerabilities, compliance issues, and infrastructure misconfigurations.

Services

  • Premium Support

    Premium Support

    Maximize ROI with prioritized technical support, metrics monitoring, and operational assistance.

  • Premium Services

    Premium Services

    Augment your security team with Checkmarx services to ensure the success of your AppSec program.

  • Maturity Assessment

    Maturity Assessment

    Assess the current state of your AppSec program, benchmark against peers, and get actionable next steps for improvement.

Get a Demo

Discover Checkmarx Secrets Detection

Learn how easy it is to prevent the exposure of secret credentials that can lead to disaster.

Trusted By: