Open Source Secret Scanner with Live Validation
Detect, validate, and revoke leaked credentials across your codebase, Git history, cloud storage, and developer platforms. Built in Rust by MongoDB.
Files, Git repos, GitHub, GitLab, Azure Repos, Bitbucket, Gitea, Hugging Face, Docker images, AWS S3, Google Cloud Storage, Jira, Confluence, Slack, and Microsoft Teams.
Automatically validate discovered credentials against provider APIs. Eliminate false positives by confirming which secrets are actually live and active.
Go beyond detection. Map leaked keys to their effective cloud identities and exposed resources with --access-map. See exactly what an attacker could access.
Revoke compromised credentials directly from the CLI for 20+ providers including GitHub, GitLab, Slack, AWS, GCP, Heroku, and Cloudflare.
Tree-sitter language-aware parsing across 13+ languages reduces false positives at the detection layer. Combined with entropy filtering, checksum verification, and live validation, Kingfisher delivers high-signal results you can act on.
Detects and validates tokens for 35+ AI/ML providers including OpenAI, Anthropic, Google Gemini, Mistral, Cohere, and more. Purpose-built TOON output format for token-efficient LLM and agent workflows.
Rust-powered with Intel Hyperscan SIMD-accelerated regex. Multithreaded scanning handles massive codebases while making minimal network requests through intelligent validation.
Kingfisher scans the Linux kernel in 205 seconds and the GitLab monorepo with just 17 HTTP validation requests. Intelligent validation means fewer API calls and faster results at scale.
brew install kingfisheruv tool install kingfisher-bindocker run --rm -v "$PWD":/src ghcr.io/mongodb/kingfisher:latest scan /srccurl -sSL https://raw.githubusercontent.com/mongodb/kingfisher/main/scripts/install-kingfisher.sh | bash