Quick Start¶
Get scanning in under a minute.
1. Install Kingfisher¶
For all installation options, see the Installation Guide.
2. Scan a Directory¶
Kingfisher automatically detects whether the path is a Git repo or plain directory.
3. View Results in Your Browser¶
4. Show Only Live Secrets¶
Filter to only secrets confirmed active by provider APIs:
5. Map the Blast Radius¶
See exactly what resources a leaked credential can access:
6. Revoke a Compromised Secret¶
# Revoke a GitHub token
kingfisher revoke --rule github "ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
# Revoke AWS credentials
kingfisher revoke --rule aws --arg "AKIAIOSFODNN7EXAMPLE" "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"
7. Scan a GitHub Organization¶
8. Output JSON for CI/CD¶
What's Next?¶
- Basic Scanning — full scanning guide with all options
- Platform Integrations — GitHub, GitLab, S3, Docker, Slack, and more
- Writing Custom Rules — create detection rules for your own patterns
- Access Map — blast radius mapping for 39 providers