127,309 tools. Last updated 2026-05-05 14:21
"Secret scanning and credential detection tools" matching MCP tools:
- Retrieve and display GitHub Advanced Security secret scanning alerts for a specified repository to identify and manage potential security risks.MIT
- Retrieve secret scanning scan history for a repository to review past secret detection events.
- Retrieve a specific secret scanning alert from a GitHub repository, including secret type and location, with an option to hide the literal secret.
- List secret scanning alerts in a repository to detect exposed secrets. Supports filtering by state, type, assignee, and resolution for efficient security monitoring.
- Retrieve all locations associated with a specific secret scanning alert in a GitHub repository to pinpoint where secrets are exposed.
Matching MCP Servers
- Alicense-qualityCmaintenanceScans code for exposed secrets, API keys, tokens, and credentials across 69 patterns covering cloud services, AI platforms, payment providers, authentication services, and databases.Last updatedMIT
- Flicense-qualityBmaintenanceEnables AI assistants to write .env files with secrets stored locally, allowing search by name/description while keeping actual secret values private and never exposed to the AI.Last updated5
Matching MCP Connectors
Toxicity, sentiment, NER, PII detection, and language identification tools
Provide your AI coding tools with token-efficient access to up-to-date technical documentation for…
- Update a secret scanning alert in a GitHub repository by providing owner, repo, and alert number, with an optional request body for modifications.
- Permanently remove a secret and all its environment states from the keyring for a given scope. Use this destructive action when a credential is retired or created in error. Cannot be undone.
- Retrieve the plaintext value of a secret from the q-ring keyring. Use when an agent needs the actual credential to call an external API or inject into a runtime. Returns JSON with key and value.
- Ask upstream provider to issue a fresh credential for an existing secret and store the new value into the keyring. Use when a secret is expiring, leaked, or part of a scheduled rotation.
- Extract malware detection signatures from Joe Sandbox analysis reports to identify malicious behaviors like code injection or credential theft, with optional filtering for high-impact indicators.
- Validate JWT credential authenticity by checking signatures against issuer keys, returning decoded claims and verification status for debugging or pre-action inspection.
- Create a narrower child credential from an existing parent credential to delegate limited authority to sub-agents or isolated steps while maintaining scope restrictions.
- Link two secret keys across scopes so updates to either propagate the same value to both. Prevents credential drift when the same logical secret, like an API key, exists under multiple names or scopes.
- Analyze federal website health by checking DAP analytics, USWDS adoption, and mobile readiness using daily-updated GSA Site Scanning data.
- Enforce zero-tolerance security policy by evaluating SAST, secret detection, injection surfaces, auth boundaries, and TLS config. Any CRITICAL finding or exposed secret results in a VIOLATION verdict.MIT
- List Harden-Runner security detections for a GitHub organization, filtered by detection type (e.g., 'Action-Uses-Imposter-Commit') and status (new, suppressed, resolved).
- Retrieve detailed information about security detections in Panther, including detection bodies and test cases, to analyze and understand threat monitoring rules.PythonApache 2.0
- Modify secret details in Infisical, including name, value, or path, for a specific project and environment.Apache 2.0