Secrets

Overview

Heeler provides real-time secret detection and validation to help security teams rapidly identify, validate, and remediate exposed credentials across their software development lifecycle. Unlike traditional secret scanners that rely solely on pattern matching, Heeler combines high-performance scanning, language-aware detection, and active validation to surface only the secrets that truly matter.

Heeler's secret detection is designed to reduce noise, eliminate false positives, and prioritize secrets that represent immediate, exploitable risk.

What Heeler Scans

Heeler continuously analyzes multiple sources to uncover hard-coded credentials, API keys, tokens, and other sensitive data:

  • Code repositories

  • Git commit histories (including historical exposure)

Supported Source Control Providers

Heeler supports secret detection across the most common enterprise SCM platforms:

  • GitHub

  • GitLab

  • Azure DevOps

  • Bitbucket

Language-Aware Secret Detection

Heeler supports 20+ programming languages and understands language-specific syntax and structures. This enables:

  • Reduced false positives through contextual parsing

  • Improved detection accuracy compared to regex-only tools

  • Accurate identification of secrets embedded in configuration files, source code, and scripts

For example, Heeler understands the difference between a string literal in code, a commented-out value, and a configuration key that is actually loaded at runtime—allowing it to ignore dead code while flagging real exposure.

To achieve this at scale, Heeler combines:

  • Advanced parsing and regex techniques

  • Multi-threaded scanning for high performance

  • Deep traversal of repositories, commit history, and artifacts

Heeler leverages more than 700 detection and validation rules, allowing it to identify a broad range of secret types across providers, languages, and usage patterns.

Secret Validation

Heeler uses two complementary forms of validation to determine whether a detected secret represents real, exploitable risk. By combining offline structural validation with active external validation, Heeler dramatically reduces false positives while prioritizing secrets that are truly dangerous.

These layers work together to ensure accuracy, performance, and signal quality at scale.

Many secret scanning tools generate large volumes of findings that are no longer valid or exploitable. Heeler addresses this by actively validating detected secrets to determine whether they are currently active and usable.

This dynamic validation approach allows teams to:

  • Focus remediation efforts on real risk

  • Eliminate false positives

  • Understand which secrets pose an immediate threat

Checksum-Aware Validation

Modern API tokens increasingly include built-in checksums: short internal digests that make each credential self-verifiable. These checksum-based formats are designed to dramatically reduce false positives by allowing tools to confirm whether a token is structurally valid before attempting any live validation.

Heeler supports checksum-aware matching within its detection rules, enabling structural verification of credentials without calling third-party APIs.

For tokens that support checksums, Heeler validates the token’s internal checksum and automatically filters out structurally invalid or fake credentials before any external validation is attempted. This eliminates nearly all false positives at the earliest stage of detection.

Why This Matters

  • Offline verification: no API call required

  • Industry-aligned: compatible with modern prefix + checksum token designs (for example, newer personal access token formats)

  • Lower false positives: invalid tokens are rejected based on structure alone, prior to active validation

Active External Validation

Once a potential secret is detected, Heeler performs external validation checks, which may include:

  • Calling cloud service APIs

  • Testing database connectivity

  • Verifying API tokens against live endpoints

Heeler validates secrets across:

  • AWS

  • Azure

  • Google Cloud

  • Any additional supported platforms in use

Heeler identifies cross-cloud and multi-platform risks, providing unified visibility regardless of where secrets live.

Viewing Secrets in Heeler

Inventory

Detected Secrets are displayed in: Security > Secretsarrow-up-right

By default, Heeler displays only active (validated) secrets, ensuring teams immediately see the highest-risk findings.

Filtering

The Secrets page includes sub-navigation filters to help narrow and prioritize findings:

Provider

Filter secrets by the associated provider (for example, AWS, Azure, GCP, or other supported services).

Active

Controls which validation states are displayed:

  • ✔ (checked) – Show only active (validated) secrets (default)

  • – – Show only non-active secrets

  • ◯ – Show all secrets (active and non-active)

Repository

Restrict results to a specific repository to focus investigations or remediation efforts.

Secret Attributes

Each entry in the Secrets inventory includes the following details:

Provider

The name of the service or platform associated with the detected secret.

Repository

A hyperlink to the repository where the secret was found.

Confidence

Indicates the reliability of the detection rule:

  • High Confidence Highly specific rules that catch fewer but more reliable secrets. These have fewer false positives but may miss some edge cases.

  • Medium Confidence Broader rules that detect more potential secrets. These may introduce more false positives but reduce the risk of missed true positives.

With active validation, Heeler eliminates false positives by confirming whether detected secrets are active.

Validated

Displays the validation status of the secret:

  • ✔ – Secret is active and validated

  • ✖ – Secret is not active

  • ? – Validation was skipped. Heeler will skip certain secrets like Canary Tokens at AWS.

Hovering over the icon provides validation context.

File Path

A hyperlink to the exact file path where the secret was detected.

Committer

The name of the committer associated with the secret. In some cases, this may be a non-human identity (NHI), such as GitHub where automation has been used.

Git Command

A ready-to-use Git command that can be run locally to display detailed information about the specific Git object.

Detected

The date and time when Heeler first detected the secret.

Key Benefits

  • Real-time detection across repositories, history, and filesystems

  • Language-aware scanning with reduced false positives

  • Active validation to prioritize real risk

  • Unified visibility across cloud and non-cloud providers

  • Scales with enterprise environments using high-performance, multi-threaded scanning

Heeler’s approach ensures security teams spend less time triaging noise and more time mitigating the secrets that truly put their organization at risk.

Last updated

Was this helpful?