Prevent committing sensitive keys to repos
-
Updated
Sep 21, 2025 - Shell
8000
Prevent committing sensitive keys to repos
This simple repository offers a set of guards to mitigate secret leakage into application source codes. It can prevent the disclosure of sensitive API keys, web hooks and cloud tokens by setting three guards. Pre-commit, Pre-Push and on PR. If secret somehow escapes into the PR, it fails it and opens an issue.
Git secret scanner and protection tool - prevent API keys, passwords, and credentials from being committed (Dual Licensed: GPL v3 / Commercial)
Add a description, image, and links to the api-keys topic page so that developers can more easily learn about it.
To associate your repository with the api-keys topic, visit your repo's landing page and select "manage topics."