Guardy
🔍 Scan

🎯 Patterns

Built-in patterns for detecting secrets and credentials

Guardy detects 100+ types of secrets including:

API Keys & Tokens

PatternExamplesConfidence
AWS Access KeyAKIA[0-9A-Z]{16}0.95
GitHub Tokenghp_[a-zA-Z0-9]{36}0.99
Stripe Keysk_live_[0-9a-zA-Z]{24}0.95
SendGrid KeySG\.[a-zA-Z0-9]{22}\.[a-zA-Z0-9]{43}0.98
Slack Tokenxox[baprs]-[0-9]{10,13}-[a-zA-Z0-9]+0.95
NPM Tokennpm_[a-zA-Z0-9]{36}0.95

Cloud Providers

ProviderPattern TypesExamples
AWSAccess keys, Secret keys, MWS keysAKIA*, aws_secret_access_key
GoogleAPI keys, OAuth tokens, Service accountsAIza*, private keys
AzureConnection strings, Keys, PasswordsDefaultEndpointsProtocol=
HerokuAPI keys[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}

Authentication

TypePatternRisk Level
JWT TokeneyJ[A-Za-z0-9-_]+\.[A-Za-z0-9-_]+\.[A-Za-z0-9-_]*High
Basic Auth://[^:]+:[^@]+@High
Private Key-----BEGIN (RSA|EC|OPENSSH) PRIVATE KEY-----Critical
Password in URLpassword=\S+High

Database & Infrastructure

  • PostgreSQL/MySQL connection strings
  • MongoDB connection strings
  • Redis URLs
  • Docker registry credentials
  • SSH private keys

Custom Patterns

Define your own patterns:

scanner:
  patterns:
    - name: "Company API Key"
      regex: 'COMP_API_[A-Z0-9]{32}'
      confidence: 0.9
      severity: high

    - name: "Internal Token"
      regex: 'internal_token_[a-f0-9]{40}'
      confidence: 0.85
      severity: medium