Quick Start¶
Get scanning in under a minute.
1. Install Kingfisher¶
For all installation options, see the Installation Guide.
2. Scan a Directory¶
Kingfisher automatically detects whether the path is a Git repo or plain directory.
3. View Results in Your Browser¶
You can also open existing Kingfisher, Gitleaks, or TruffleHog JSON reports with kingfisher view <report.json>.
If you want a shareable upload-based version, the docs site also hosts the report viewer.
4. Show Only Live Secrets¶
Filter to only secrets confirmed active by provider APIs:
5. Map the Blast Radius¶
See exactly what resources a leaked credential can access:
6. Revoke a Compromised Secret¶
# Revoke a GitHub token
kingfisher revoke --rule github "ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
# Revoke AWS credentials
kingfisher revoke --rule aws --arg "AKIAIOSFODNN7EXAMPLE" "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"
7. Scan a GitHub Organization¶
8. Output JSON for CI/CD¶
What's Next?¶
- Basic Scanning — full scanning guide with all options
- Platform Integrations — GitHub, GitLab, S3, Docker, Slack, and more
- Writing Custom Rules — create detection rules for your own patterns
- Access Map — blast radius mapping for 43 providers
- Report Viewer & Triager — local and hosted viewer for Kingfisher, Gitleaks, and TruffleHog JSON reports