Skip to content
| Marketplace
Sign in
Visual Studio Code>Programming Languages>Secrets-LENew to Visual Studio Code? Get it now.
Secrets-LE

Secrets-LE

OffensiveEdge

| (1) | Free
Zero-Hassle Secrets Detection & Sanitization - Detect and sanitize credentials, tokens, and API keys locally — before you commit. GitGuardian-level security without ever sending data off your machine.
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

Secrets-LE Logo

Secrets-LE: Zero Hassle Secret Detection

Detect and sanitize credentials, tokens, and API keys locally
GitGuardian-level security without ever sending data off your machine

Install from Open VSX Install from VS Code

Downloads Rating 100% Open Source Zero Critical Vulnerabilities


Secret Detection Demo


⚡ See It In Action

Before: Manually searching for hardcoded secrets across 100+ files (30+ minutes)

// File: src/config.js
const apiKey = "AKIAIOSFODNN7EXAMPLE"

// File: .env
DATABASE_PASSWORD=mysecret123

// File: credentials.json
{"github_token": "ghp_xxxxx"}
// ... searching through entire codebase

After: One command scans entire workspace and detects all secrets automatically

📄 src/config.js (1 secret(s))
  AWS-KEY (1)
  - Line 2, Column 14
    Key: apiKey
    Confidence: high

📄 .env (1 secret(s))
  PASSWORD (1)
  - Line 15, Column 18
    Key: DATABASE_PASSWORD
    Confidence: medium

📄 credentials.json (1 secret(s))
  TOKEN (1)
  - Line 3, Column 18
    Key: github_token
    Confidence: high

... (12 secrets found across 8 files, 247 files scanned)

✅ Why Secrets-LE?

  • 19 secret types detected - API keys, AWS, Azure, GCP, JWT, tokens, passwords, private keys
  • Workspace-wide scanning - Scans entire project, not just single files
  • Zero Config - Install → Press Cmd+Alt+S → Done
  • 100% Local - No data leaves your machine, ever
  • GitGuardian-level detection - Without the cloud dependency
  • Smart exclusions - Automatically skips node_modules, .git, dist, and other build artifacts

Perfect for pre-commit checks, security audits, and credential management across entire codebases.


🙏 Thank You

If Secrets-LE saves you time, a quick rating helps other developers discover it:
⭐ Open VSX • VS Code Marketplace


Key Features

  • Workspace Scanning - Scans entire project for secrets across all files
  • Detect Secrets - Find API keys, tokens, passwords, and private keys
  • Smart File Filtering - Automatically excludes node_modules, .git, build artifacts
  • Sanitize Content - Automatically replace secrets with safe placeholders
  • Configurable Sensitivity - Adjust detection levels (low, medium, high)
  • Security-First - Detects AWS, Azure, GCP keys, JWT tokens, and more
  • Universal Support - Works on any text file format
  • 4 languages - English (base), German, Spanish, French

🚀 More from the LE Family

  • String-LE - Extract user-visible strings for i18n and validation • VS Code Marketplace
  • Numbers-LE - Extract and analyze numeric data with statistics • VS Code Marketplace
  • EnvSync-LE - Keep .env files in sync with visual diffs • VS Code Marketplace
  • Paths-LE - Extract file paths from imports and dependencies • VS Code Marketplace
  • Regex-LE - Test and validate regex patterns with live feedback • VS Code Marketplace
  • Scrape-LE - Validate scraper targets before debugging • VS Code Marketplace
  • Colors-LE - Extract and analyze colors from stylesheets • VS Code Marketplace
  • URLs-LE - Extract URLs from any codebase with precision • VS Code Marketplace
  • Dates-LE - Extract temporal data from logs and APIs • VS Code Marketplace

💡 Use Cases

  • Pre-Commit Checks - Scan entire workspace before committing to prevent credential leaks
  • Security Audits - Find hardcoded secrets across entire codebase automatically
  • Project Security - Scan all files in your workspace for exposed credentials
  • Config Validation - Ensure no secrets in config files before deployment
  • Code Review - Quick workspace scan during pull request reviews
  • Compliance - Regular scans to maintain security standards

Detecting API Keys & Credentials

Find cloud provider keys and credentials automatically:

// AWS Access Key
const AWS_KEY = "AKIAIOSFODNN7EXAMPLE" // ✅ Detected

// Azure Key
const AZURE_KEY = "DefaultEndpointsProtocol=https;AccountKey=..." // ✅ Detected

// GCP Service Account
const GCP_KEY = '{"type":"service_account",...}' // ✅ Detected

Detecting Tokens & Authentication

Find authentication tokens:

// GitHub Personal Access Token
const GITHUB_TOKEN = "ghp_[REDACTED]" // ✅ Detected (example pattern)

// JWT Token
const JWT = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..." // ✅ Detected

// Bearer Token
Authorization: Bearer sk_live_[REDACTED] // ✅ Detected

Detecting Passwords & Private Keys

Find passwords and private keys:

# Environment file
DATABASE_PASSWORD=mysecret123  # ✅ Detected
API_KEY=sk_live_abcdefgh       # ✅ Detected
-----BEGIN RSA PRIVATE KEY-----
MIIEpAIBAAKCAQEA...  # ✅ Detected
-----END RSA PRIVATE KEY-----

🚀 Quick Start

  1. Install from Open VSX or VS Code Marketplace
  2. Open a workspace folder in VS Code
  3. Run Secrets-LE: Detect Secrets (Cmd+Alt+S / Ctrl+Alt+S)
  4. Review detected secrets grouped by file and type
  5. Sanitize secrets if needed using the sanitize command

📋 Available Commands

Secrets-LE provides 4 commands accessible via Command Palette (Ctrl+Shift+P / Cmd+Shift+P):

Core Commands

  • Detect Secrets (Cmd/Ctrl+Alt+S) - Scan entire workspace for API keys, tokens, passwords
  • Sanitize Secrets - Replace detected secrets with safe placeholders in active file

Settings & Help

  • Open Settings - Quick access to extension settings
  • Help & Troubleshooting - Comprehensive in-editor documentation

⚙️ Configuration

Secrets-LE has minimal configuration to keep things simple. Most settings are available in VS Code's settings UI under "Secrets-LE".

Key settings include:

  • Workspace scanning:
    • File patterns to scan (workspace.scanPatterns, default: **/*)
    • Exclude patterns (workspace.scanExcludes, default: node_modules, .git, dist, etc.)
    • Maximum files to scan (workspace.scanMaxFiles, default: 10000)
  • Detection:
    • Sensitivity (low, medium, high)
    • Secret type filters (API keys, passwords, tokens, private keys)
  • Output:
    • Sanitization replacement text
    • Deduplication options
    • Format preferences (side-by-side, clipboard copy)
  • Safety:
    • File size warnings and thresholds
    • Notification levels (silent, important, all)

For the complete list of available settings, open VS Code Settings and search for "secrets-le".

📁 Supported File Types

Secrets-LE works universally on any text file in your workspace! Detection uses regex patterns applied directly to text content. The extension scans your entire workspace and processes all text files by default.

Workspace Scanning

By default, Secrets-LE scans all files (**/*) but automatically excludes:

  • node_modules/** - Dependencies
  • .git/** - Version control
  • dist/**, build/** - Build outputs
  • .next/**, coverage/** - Framework artifacts
  • *.min.js, *.bundle.js - Minified files
  • Lock files (package-lock.json, yarn.lock, etc.)

You can customize scan patterns and exclusions in settings.

File Type Support

Category File Types
Programming JavaScript, TypeScript, Python, Ruby, Go, Rust, Java, C/C++, C#, PHP, Swift, Kotlin
Data Formats JSON, YAML, TOML, XML, CSV
Web HTML, CSS, SCSS, LESS, Sass
Config .env, .ini, .cfg, .conf
Documentation Markdown, Plain Text, Log Files
Shell Bash, Zsh, PowerShell, Batch

All text files are supported - Once the extension is activated, it can scan any text file in your workspace.

What Gets Detected

API Keys & Credentials:

  • Generic API keys (apiKey, api_key)
  • AWS Access Keys (AKIA...)
  • AWS Secret Keys (base64 encoded, 40 chars)
  • Azure keys
  • GCP service account keys
  • Database connection strings

Tokens:

  • GitHub Personal Access Tokens (ghp_...)
  • JWT tokens
  • OAuth tokens
  • Bearer tokens
  • Access/Refresh tokens

Passwords:

  • Plaintext passwords
  • Password fields in configs

Private Keys:

  • SSH keys (RSA, ED25519)
  • PGP keys
  • Private key files

🌍 Language Support

13 languages: English, German, Spanish, French, Indonesian, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Ukrainian, Vietnamese, Chinese (Simplified)

🧩 System Requirements

VS Code 1.70.0+ • Platform Windows, macOS, Linux
Memory 200MB recommended for large files

🔒 Privacy

100% local processing. No data leaves your machine. Optional logging: secrets-le.telemetryEnabled

⚡ Performance

Secrets-LE includes built-in performance monitoring and configurable thresholds to help track operation speed and resource usage.

For detailed information, see Performance Monitoring.

🔧 Troubleshooting

Not detecting secrets?

  • Ensure workspace folder is open (not just a file)
  • Check sensitivity level in settings (try "high" for maximum detection)
  • Verify scan patterns include your file types in settings

Scanning too many files?

  • Adjust workspace.scanMaxFiles to limit the number of files scanned
  • Add more exclude patterns to skip build artifacts or generated files

False positives?

  • Lower sensitivity level or disable specific secret types
  • Review detected secrets - some may be example/test values

Performance issues?

  • Reduce workspace.scanMaxFiles limit
  • Add more exclude patterns to skip large directories
  • Check Performance Monitoring for optimization tips

Need help?
Check Issues or enable logging: secrets-le.telemetryEnabled: true

❓ FAQ

What secrets are detected?
19 types including API keys, AWS, Azure, GCP, JWT, tokens, passwords, private keys

Does it send data anywhere?
No! 100% local processing. No network requests ever

Can I customize detection?
Yes! Adjust sensitivity levels and enable/disable specific secret types

How accurate is detection?
High accuracy with configurable sensitivity to reduce false positives

Does it scan the entire workspace?
Yes! By default it scans all files in your workspace, excluding common directories like node_modules and .git. You can customize scan patterns in settings.

📊 Testing

17 unit tests • Powered by Vitest • Run with bun run test:coverage

Core Principle

No broken or failed tests are allowed in commits. All tests must pass before code can be committed or merged.

Test Suite Highlights

  • Comprehensive secret detection across 19 types
  • Sanitization validation with replacement verification
  • Error handling with graceful degradation
  • Security-focused testing for edge cases

For detailed testing guidelines, see Testing Guidelines.


Copyright © 2025 @OffensiveEdge. All rights reserved.

  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2025 Microsoft