Prevent Secret Leaks in source code

A How-to guide featuring Pre-Commit hooks & Gitleaks

Abu
Published in
5 min readApr 12, 2024

--

Nowadays, the communication between software systems requires some sort of access credentials. Passwords, API-Keys, Client-Secrets, Passphrases, JWT-Tokens, and so on. That’s very good to protect communication and user data. Usually, we refer to those access credentials as “Secrets”. As the name suggests, they must…

--

--

Writer for

Technical Lead | Sr. DevSecOps Engineer | Offensive Cybersecurity