Skip to content
ES EN

Secrets Scan

The secrets scan detects credentials, tokens, private keys, and hardcoded passwords in your source code and Git history. Gerion uses Gitleaks as the detection engine.

Run

Ventana de terminal
gerion secrets-scan [PATH]
Ventana de terminal
# Scan the current directory
gerion secrets-scan .
# Save results as JSON
gerion secrets-scan . --format json --output-file secrets.json
# Send results to the Gerion API
gerion secrets-scan . --api-url $GERION_API_URL --api-key $GERION_API_KEY

Detected secret types

Gitleaks includes more than 150 predefined rules:

CategoryExamples
Cloud providersAWS Access Keys, Google Cloud credentials, Azure secrets
Repositories & CI/CDGitHub tokens, GitLab tokens, CircleCI tokens
CommunicationSlack tokens, Twilio, Mailgun, SendGrid
PaymentsStripe keys, PayPal, Square
DatabasesConnection strings with embedded credentials
CryptographyRSA/EC/SSH private keys, PEM certificates
Generic APIsBearer tokens, API keys matching common patterns

Secret redaction

For security, Gerion CLI never sends the full secret to the platform. The value is redacted showing only 30% of the content (start + end):

AWS_ACCESS_KEY_ID: AKIA****[REDACTED]****XAMPLE

Options

OptionDescription
--formatOutput format: json | markdown | sarif
--output-fileSave results to a file (disables API submission)
--api-urlGerion API Gateway URL
--api-keyM2M API key
--timeoutTimeout in seconds (default: 180)
--log-leveldebug | info | warning | error