scan_secrets_history
Scan git history to detect secrets committed in past commits, even if later removed. Distinguishes active code exposures from historical leaks requiring credential rotation.
Instructions
Scan git history for leaked secrets. Finds secrets that were committed in the past — even if they were later removed. Marks each finding as 'active' (still in code) or 'removed' (in git history only, needs rotation).
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| path | Yes | Repository root path | |
| max_commits | No | Maximum number of commits to scan | |
| format | No | Output format | markdown |