From a1ff4c7f7bfb5ca11aa3f7bf7bd01986f527ca52 Mon Sep 17 00:00:00 2001 From: "Danilo M." Date: Tue, 5 May 2026 16:49:23 +0200 Subject: Added: gitleaks slackbuild --- gitleaks/README | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 gitleaks/README (limited to 'gitleaks/README') diff --git a/gitleaks/README b/gitleaks/README new file mode 100644 index 0000000..be165d2 --- /dev/null +++ b/gitleaks/README @@ -0,0 +1,19 @@ +gitleaks (detect secrets in git repositories) + +Gitleaks is a fast, lightweight tool for detecting hardcoded secrets +such as API keys, passwords, and tokens in git repositories. It uses +a combination of regex pattern matching and entropy analysis to scan +commit history, staged files, and the working directory. + +It is commonly used as a pre-commit or pre-push git hook to prevent +accidental exposure of credentials before they reach a remote +repository. Over 150 secret types are supported out of the box, +and custom rules can be defined via a TOML configuration file. + +Gitleaks is distributed as a statically linked Go binary. No +runtime dependencies are required. + +Optional: A custom rules file can be passed at runtime: + gitleaks detect --config /path/to/config.toml + +Homepage: https://github.com/gitleaks/gitleaks -- cgit v1.2.3