Tools & TutorialsMEDIUM

Betterleaks - New Open-Source Tool for Secrets Scanning

🎯

Basically, Betterleaks is a tool that helps find hidden passwords in code files.

Quick Summary

Introducing Betterleaks, a new open-source tool for scanning exposed credentials in directories and Git repositories. Developed by the creator of Gitleaks, it offers enhanced speed and accuracy. This tool is essential for developers and security teams aiming to protect sensitive information effectively.

What It Does

Betterleaks is an innovative open-source tool designed to scan directories, files, and Git repositories for exposed credentials. Created by the developer of the popular Gitleaks tool, Betterleaks aims to enhance the scanning process with improved speed and accuracy. Sponsored by Aikido Security, this tool is a highly configurable successor that retains the same command-line interface (CLI) options as its predecessor, making it easy for users to transition.

The tool is built on a pure Go architecture, which allows it to run seamlessly across different environments. One of its standout features is the Token Efficiency Scanning, which employs a technique based on BPE tokenization. This method boasts an impressive 98.6% recall rate, significantly outperforming older entropy-based techniques used in previous tools. Betterleaks is designed to be a drop-in replacement for Gitleaks, ensuring that existing configurations work immediately.

Key Features

Betterleaks introduces several major advancements over Gitleaks. The tool's Rule-Defined Validation is written using the Common Expression Language (CEL), making it easier for the community to contribute new rules for emerging services. Additionally, it features Default Encoding Detection, which automatically identifies secrets hidden by multiple layers of encoding. The tool also supports Parallelized Git Scanning, allowing it to scan repositories much faster than existing alternatives.

The development team behind Betterleaks consists of four security experts with backgrounds in major companies like Red Hat and Amazon. This collaborative approach ensures a stable and community-driven development roadmap. The project is maintained under an open-source MIT license, allowing for broad community involvement and contributions.

Future Plans

Looking ahead, the Betterleaks team has ambitious plans for future releases. The roadmap includes expanding the scanning capabilities beyond just Git repositories and files. They aim to integrate LLM-assisted secret classification using anonymized data, which will enhance the tool's ability to identify sensitive information.

Additional features, such as auto-revocation of exposed credentials via provider APIs and permissions mapping to understand access levels granted by leaked secrets, are also in the works. These enhancements will make Betterleaks an even more powerful tool for developers and security teams, especially in AI-driven environments.

How to Get Started

Betterleaks is available on GitHub, where users can download the tool and access documentation for setup and usage. The development team encourages contributions from the community to expand its capabilities further. As the tool evolves, it promises to be a critical asset for anyone involved in software development and security, helping to protect sensitive information from being exposed in code.

With Betterleaks, developers and security teams can automate the scanning process, ensuring that their code remains secure and free from vulnerabilities that could lead to data breaches. The collaborative nature of its development ensures that it stays relevant and effective in an ever-changing cybersecurity landscape.

🔒 Pro insight: Betterleaks' advanced scanning techniques set a new standard for secrets detection, making it a must-have for security-conscious developers.

Original article from

Cyber Security News · Abinaya

Read Full Article

Related Pings

MEDIUMTools & Tutorials

Stellar Cyber 6.4.0 - Enhancing SOC with Autonomous Capabilities

Stellar Cyber has launched version 6.4.0, enhancing its platform with Autonomous SOC capabilities. This update helps security teams reduce alert noise and speed up investigations. With AI-driven tools, analysts can focus on critical incidents, improving overall efficiency and response times.

Help Net Security·
LOWTools & Tutorials

File Shredder - Permanently Delete Files with Confidence

Malwarebytes introduces File Shredder to ensure deleted files are permanently erased. This tool is essential for anyone concerned about data recovery and privacy. With multiple shredding levels, it caters to varying security needs, making it a must-have for sensitive information management.

Malwarebytes Labs·
LOWTools & Tutorials

Elastic Security - Get Started with Your AI Agent Today

Elastic Security has launched open-source Agent Skills for AI agents. This lets users set up a security environment quickly, enhancing their security capabilities. Explore how these skills can streamline your security processes and improve efficiency.

Elastic Security Labs·
MEDIUMTools & Tutorials

Security Validation - Embracing Agentic AI for Efficiency

Security validation is evolving with the introduction of Agentic AI, streamlining threat detection. Organizations can now unify their security tools for better efficiency. This shift is crucial for staying ahead of modern cyber threats.

The Hacker News·
MEDIUMTools & Tutorials

Tools - JSOC IT Launches AUTOPSY for Security Verification

JSOC IT has launched AUTOPSY, a new platform for real-time security verification. It replaces outdated self-reported assessments with live API data. This proactive tool helps organizations uncover critical vulnerabilities before breaches occur.

Help Net Security·
MEDIUMTools & Tutorials

VulHunt - New Open-source Vulnerability Detection Tool Released

Binarly has released VulHunt Community Edition, an open-source tool for detecting software vulnerabilities. This framework is perfect for independent researchers looking to enhance security. With its multi-format support, it simplifies vulnerability detection and analysis.

Help Net Security·