Checkmarx One
Minimize the risk of cyberattacks by preventing exposure of hard-coded passwords, access tokens, keys, and other sensitive credentials.
Automatically prevent hard-coded secrets from reaching your code repositories.
Powerful Secrets Detection
Checkmarx accurately identifies 170+ different types of login credentials, access tokens, encryption keys, API keys, SSH keys, webhook URLs, and other unsecured sensitive information.
Live Secrets Validation
To prioritize remediation efforts, the system automatically attempts to determine if discovered secrets are still valid and thus potentially exploitable.
Pre-Commit Exposure Prevention
Code commits containing hard-coded secrets can be automatically blocked to prevent sensitive credentials from reaching Git repositories.
Developer-Friendly Workflows
Developers can initiate scans for exposed secrets, review results, and receive remediation guidance – all within their IDE. Scans can also be initiated via CLI, API, and the Checkmarx One UI.
Comprehensive & Actionable Reporting
Detailed reporting includes insights on detected secrets to provide clear and actionable guidance to efficiently address risks.
Checkmarx accurately identifies 170+ different types of login credentials, access tokens, encryption keys, API keys, SSH keys, webhook URLs, and other unsecured sensitive information.
To prioritize remediation efforts, the system automatically attempts to determine if discovered secrets are still valid and thus potentially exploitable.
Code commits containing hard-coded secrets can be automatically blocked to prevent sensitive credentials from reaching Git repositories.
Developers can initiate scans for exposed secrets, review results, and receive remediation guidance – all within their IDE. Scans can also be initiated via CLI, API, and the Checkmarx One UI.
Detailed reporting includes insights on detected secrets to provide clear and actionable guidance to efficiently address risks.
See how Checkmarx Secrets Detection prevents exposed credentials across repos, SCMs, containers, and pipelines—with pre-commit scans to stop leaks before they happen.
Learn how leading enterprises use Checkmarx to help them eliminate the threats of exposed secrets.
What’s in it for you
Minimize security risks and strengthen your security posture by ensuring that no unsecured secret credentials are not making your organization vulnerable to attack.
It is important to identify any private or sensitive information that could potentially be used in an attack or data breach. This includes credentials (such as usernames or passwords that can grant a user or system access to resources or services), API keys or tokens (unique identifiers to authorize access to an API or web service), private keys or encryption keys (such as those used to encrypt/decrypt sensitive data or secure communication protocols), certificates (codes used to establish trust between two entities, such as between a server and a client), and private endpoint/webhook URLs.
Secrets can be exposed in a wide variety of places, including source code, configuration files (e.g., IaC files), CI/CD pipelines, developer productivity tools, collaboration tools, wikis, and generative AI tools. To minimize potential vulnerabilities, any secrets exposed in any non-private location must be identified, removed, and changed.
An effective secrets detection algorithm must exhibit high precision and high recall. High precision means a low number of false alerts. In other words, high precision means that a high percentage of identified secrets are actual secrets that are at risk of exposure. High recall means that a low number of secrets are missed. Given that even one undetected credential can introduce a large amount of risk, it is often considered preferable to have to investigate some false alerts to ensure that no real exposed secrets are overlooked.
Any time an exposed secret is discovered, it is advisable to immediately revoke/replace the secret to remove the risk of the secret being used in an attack or breach. This is especially important if the secret was exposed in a public platform (such as GitHub), because once posted it might never be possible to completely remove it. And, of course, do not repeat the mistake and include the new secret in an exposed manner.
There are many techniques that can prevent the exposure of secrets; when developers and DevOps professionals are aware of the dangers and available solutions, the incidence of exposed secrets drops sharply. Secrets can be stored in environment variables or separate files instead of hardcoding them (these files should be included in .gitignore to ensure that they are not synced to a repository). Another option is to encrypt all secrets, using a dedicated secrets management tool, and implement two-factor authentication (2FA) for any repositories that still might contain secrets. In all cases, automated scanning technology should be used to detect hard-coded secrets in source code and prevent them from being pushed to code repositories from where their leakage is more likely.
Developers often forget to remove hard-coded credentials, keys, private webhook URLs, and other sensitive secrets from their code when completing a development task. Scanning for exposed secrets upon code commit, for example, automates the process of identifying any exposed secrets, freeing up developers to focus on core development tasks.
Checkmarx One
Checkmarx One delivers a full suite of enterprise AppSec solutions in a unified, cloud-based platform that allows enterprises to secure their applications from the first line of code to deployment in the cloud.
Get everything your enterprise needs to integrate AppSec across every stage of the SDLC and build a successful AppSec program
Application Security Posture
Management (ASPM) Consolidated, correlated, prioritized insights to help your team manage risk
Code
AI PoweredConduct fast and accurate scans to identify risk in your custom code.
Identify vulnerabilities only seen in production and assess their behavior.
Eliminate shadow and zombie APls and mitigate API-specific risks.
Supply Chain
AI PoweredEasily identify, prioritize, remediate, and manage open source security and license risks.
Detect and remediate malicious or suspicious third-party packages that may be endangering your organization.
Built to accelerate AppSec teams and help developers secure applications from the first line of code.
Minimize risk by quickly identifying and eliminating exposed secrets.
Reduce security risks by health-scoring the code repositories used in your applications.
Cloud
AI PoweredScan container images, configurations, and identify open source packages and vulnerabilities preproduction and runtime.
Automatically scan your laC files for security vulnerabilities, compliance issues, and infrastructure misconfigurations.
Dev Enablement
Secure code training to upskill your developers and reduce risk from the first line of code.
Services
Maximize ROI with prioritized technical support, metrics monitoring, and operational assistance.
Augment your security team with Checkmarx services to ensure the success of your AppSec program.
Assess the current state of your AppSec program, benchmark against peers, and get actionable next steps for improvement.
Unified Dashboard, Reporting & Risk Management
Application Security Posture
Management (ASPM)
Consolidated, correlated, prioritized insights to help your team manage risk
AI Powered
Code
Static Application Security Testing (SAST)
Conduct fast and accurate scans to identify risk in your custom code.
Dynamic Application Security Testing (DAST)
Identify vulnerabilities only seen in production and assess their behavior.
API Security
Eliminate shadow and zombie APls and mitigate API-specific risks.
Supply Chain
Software Composition Analysis (SCA)
Easily identify, prioritize, remediate, and manage open source security and license risks.
Malicious Package Protection
Detect and remediate malicious or suspicious third-party packages that may be endangering your organization.
AI Security
Built to accelerate AppSec teams and help developers secure applications from the first line of code.
Secrets Detection
Minimize risk by quickly identifying and eliminating exposed secrets.
Repository Health
Reduce security risks by health-scoring the code repositories used in your applications.
Cloud
Container Security
Scan container images, configurations, and identify open source packages and vulnerabilities preproduction and runtime.
IaC Security
Automatically scan your laC files for security vulnerabilities, compliance issues, and infrastructure misconfigurations.
Get a Demo
Learn how easy it is to prevent the exposure of secret credentials that can lead to disaster.
Trusted By: