
Q1 2025 was all about turning chaos into control.
At GitGuardian, we expanded our secrets detection arsenal, launched full-scale governance for machine identities, and made it easier than ever to integrate, analyze, and act on secrets across your environment.
Here’s what’s new and why it matters.
Machine identities now outnumber humans by 100:1. Every API key, automation credential, and service account is a potential entry point for attackers.
Our new NHI Governance product helps you:
This isn’t just visibility. It's your command center for cleaning up the NHI sprawl, reducing risk, and enforcing least privilege across your stack.
Get a personalized walkthrough
GitGuardian Scout (ggscout) now supports integrations with all major secrets managers:
This powerful integration lets you:
No plaintext secrets ever leave your environment. ggscout hashes values with HMSL before any data is sent, ensuring confidentiality.
Finding a secret is only half the battle. Understanding its impact is where the real work starts. Our new Secrets Analyzer automatically gathers critical metadata for detected secrets, including:
The Critical Scopes view makes it easy to surface secrets with the most sensitive permissions (e.g., GitHub PATs with repo write access, Slack tokens with admin privileges). This allows security teams to focus on the highest-priority risks, addressing the most dangerous exposures first.
Analysis is continuous. Incidents are automatically re-checked based on status, age, and validity. This ensures that security teams stay ahead of evolving threats and don't miss critical changes in a secret's permissions.
This intelligence helps security teams:
You can’t keep treating all secrets equally. Some carry wide permissions while others are barely a threat. Now you can focus your energy where it matters most.
Explore the Secret Analyzers documentation
Generic secrets like usernames and passwords are notoriously tricky. That’s why we rolled out the Generic Secret Enricher, a machine learning model that helps:
Spend less time investigating these secrets and more time fixing the ones that matter.
We uncovered over 100,000 valid secrets leaked on public Docker infrastructure, including DockerHub.
This massive exposure highlights a concerning pattern where developers underestimate the risk of embedding secrets in their images.
Our analysis of 15 million public Docker images in late 2024 revealed that:
This exposure isn't limited to individual developers. The majority of exposures were found in corporate contexts, affecting critical sectors including pharmaceutical, energy, defense, and major tech companies.
Secrets in container images pose a critical threat, especially due to their proximity to CI/CD and runtime environments, often containing credentials for high-privilege operations.
This isn't just poor hygiene. It's a systemic risk.
You can now detect hardcoded secrets inside registries like:
Containers have credentials sneaking in through:
By scanning your container images before deployment, we help you catch these credentials before they reach production. Shift-left security just took another leap forward!
Check out our Blog Post for more details!
Secrets don't die of old age, and they're just as dangerous when forgotten. That's why we're thrilled to announce historical scanning for Jira and Confluence Cloud!
Previously, our integration would only catch secrets in real-time as they appeared. Now, we're digging through the archives to find those lurking threats from the past. This means you can:
After all, a secret leaked six months ago isn't any less compromised than one leaked yesterday.
Check out our public documentation to enable the feature:
Read how to enable secrets detection for Jira Cloud
Read how to enable secrets detection for Confluence Cloud
Track secrets and honeytoken detections within ServiceNow. Automate workflows and simplify escalation. Available under the Business plan with a 30-day trial.
Introducing GitGuardian Secrets Detection Integration For ServiceNow
You asked, we delivered. GitGuardian now supports real-time detection and full visibility for Bitbucket Cloud repositories.
Integrate Bitbucket Cloud With GitGuardian's Secrets Detection Platform Now Supports
Take control of incident management with custom tags that let you categorize, filter, and search incidents your way. Whether you're organizing by team, project, severity, or custom workflow stage, tags provide the flexibility you need to make GitGuardian work for your organization.
Developers can even interact with tags programmatically via our API, opening up endless automation possibilities.
Check out our detailed guide on how to use custom tags
Notification fatigue is real. That's why we've added granular controls for email alerts, letting you:
Learn how to customize email alert settings
Ever wonder if a particular secret has been leaked across your repositories? Now you can search directly by secret value across your entire monitored perimeter.
Get real-time alerts delivered straight to your Teams workspace—complete with action links for instant triage.
Auto-create issues, sync custom fields, and auto-resolve incidents linked to Jira tickets.
Secrets are messy. NHIs are multiplying. And security teams are stretched thin.
This quarter, we focused on helping you see more, know more, and act faster — with better detection, smarter context, and powerful automation.
Want to see these features in action? Reach out to your GitGuardian contact or book a demo.
Expect even more ways to:
Because when it comes to securing credentials, good enough just isn’t safe enough.
Until next time, keep your secrets safe.
*** This is a Security Bloggers Network syndicated blog from GitGuardian Blog - Take Control of Your Secrets Security authored by Soujanya Ain. Read the original post at: https://blog.gitguardian.com/q1-2025-recap-gitguardian-doubles-down-on-secrets-security-and-machine-identity-control/