git-alerts: detect and monitor GitHub org users’ public repositories for secrets and sensitive files

GitAlerts

GitHub repositories created under any organization can be controlled by the GitHub administrators. However, any repository created under an organization’s user account is not controllable unless the organization has adopted the GitHub enterprise-managed user (EMU) model.

Any public repository under the organization’s user account that was created accidentally or for testing purposes could leak secrets, internal information, code, etc. GitAlerts helps you detect and monitor such cases.

Usage

leak secrets

Scan GitHub repositories belonging to your organization’s users

git-alerts scan –org your-org-name

Monitor new public repositories being created by your organization’s users

git-alerts monitor –org your-org-name

Monitor new public repositories being created by your organization users with Slack notification

git-alerts monitor –org your-org-name –slack-alert

Setup slack webhook token as the environment variable

export SLACK_HOOK=SLACK_WEBHOOK_URL

Scan and generate reports with custom path

git-alerts scan –org your-org-name –report-path /your/file/path/

Scan with secrets detection using Trufflehog

Ensure trufflehog is installed in your machine

git-alerts detect –org your-org-name

Download

Copyright (C) 2024 c0d3G33k