Overview
Security posture summary · last 30 days
Detections Over Time
User Actions
Detection Heatmap
When secrets are most commonly detected (day × hour of day)
Findings
Secrets detected by type, trends, and repeat offenders
Secret Types Detected
Detection Trend by Type
Recent Detections
Repeat Offenders
Users who ignored warnings for the same secret type more than once
User Risk Ranking
Users sorted by ignore rate. Higher means more risk.
Inventory
Where and by whom secrets are being detected
Site Risk Breakdown
Top Users with Detections
All Sites
Every site where secrets were detected, with category and risk
All Users
Every user who has triggered a detection event
Event Explorer
Search, filter, and drill into all detection events
Policies
Data loss prevention and compliance controls
Policy Coverage
Secret Detection Rules
AI Detection Rules
Secret Detection Rules
All rules are active. Customise which types trigger alerts on your plan.
Keys & Certificates
AWS
Google & Firebase
GitHub
GitLab
Slack
Stripe
Payments & Commerce
Databases
Cloud Platforms
Secrets Management & Infrastructure
CI/CD & Dev Tools
Auth & Tokens
Messaging & Other
AI Detection Rules
Sensitive content categories detected using AI, beyond regex patterns
Corporate Finance
Strategy & Planning
Legal & HR
Intellectual Property
Custom Detection Rules
ProDefine your own regex patterns for internal or proprietary secret formats
No custom rules defined. Upgrade to Pro to add your own patterns.
Site Allowlist & Blocklist
ProTrusted sites where secrets are permitted, and sites where they are always blocked
Secrets on these sites will not trigger alerts (e.g. your internal tooling)
Secrets on these sites are always blocked. User cannot override.
Action Enforcement
ProOverride the default warn-and-decide behaviour for specific contexts
Ignore is not permitted when a secret is detected on an AI platform
Always prevent submission. No user override allowed.
Users must redact or cancel. Ignoring is not permitted.
Alert Notifications
ProPush detections to your team in real time
Post an alert to a Slack channel when a detection is ignored
Send an email to the security team on high-risk events
POST detection events to any endpoint: SIEM, Splunk, Datadog, etc.
User Exemptions
ProExempt specific users from triggering alerts, e.g. security engineers who legitimately handle credentials.
No exemptions defined. Upgrade to Pro to manage user exemptions.
Settings
Account and subscription management
Account
Subscription Plan
ProYou're on the free tier. Upgrade for org-wide enforcement, 90-day history, custom detection rules, and priority support.
- Org-wide policy enforcement
- 90-day event history
- Custom detection rules
- SIEM integration
- Priority support