Glossary Help Center JFrog Blog Consulting Services

This video is still being processed. Please check back later and refresh the page.

Uh oh! Something went wrong, please try again.

Secrets Detection

Catch tokens, codes, credentials, or API keys at every step of your application development with JFrog's Secrets Detection.

rate limit

Code not recognized.

About this course

"It doesn't matter how sophisticated the vault is, if the combination is written on the door."
Identify secrets exposed in your source code and binaries to prevent accidental leakage of internal tokens or random credentials, while minimizing false positives and ensuring fast remediation.

Curriculum0 hr 20 min

  • Secrets Detection
  • Introduction to Secrets Detection 0 hr 2 min
  • Secrets Detection 0 hr 10 min
  • Beat the hacker! 0 hr 5 min
  • We value your feedback
  • Installation & Configuration
  • Installing JFrog Advanced Security on a self-hosted environment
  • Configuring repositories for advanced scanning 0 hr 3 min

About this course

"It doesn't matter how sophisticated the vault is, if the combination is written on the door."
Identify secrets exposed in your source code and binaries to prevent accidental leakage of internal tokens or random credentials, while minimizing false positives and ensuring fast remediation.

Curriculum0 hr 20 min

  • Secrets Detection
  • Introduction to Secrets Detection 0 hr 2 min
  • Secrets Detection 0 hr 10 min
  • Beat the hacker! 0 hr 5 min
  • We value your feedback
  • Installation & Configuration
  • Installing JFrog Advanced Security on a self-hosted environment
  • Configuring repositories for advanced scanning 0 hr 3 min
Click here to read the terms of service | Featured | JFrog.com | Cookies Settings