Searching for Secrets
Use the search tokens below to search for secrets detected for an image. Looking for help with writing your query? click here
categorycategory
Use a text value ##### to specify the category of secrets.
Example
Show secrets associated with this category.
category: AsymmetricPrivateKey
filePathfilePath
Use a text value ##### to specify a filepath.
Example
Show secrets associated with this file.
filePath: root/test.pem
layerShalayerSha
Use a text value ##### to specify the SHA value of the image layer in which the secret was detected.
Example
Show secrets detected in this image layer.
layerSha: sha2563d762ca8378d40f3029bb10de71ec98652580cb8859248250d812bede6998505
secretTypesecretType
Use a text value ##### to specify the name of the secret detector.
Example
Show secrets detected by this secret detector.
secretType: 'LinkedIn Client Id'
severityseverity
Use a test value ##### to specify the severity of the secret. The valid values are "LOW", "MEDIUM", "HIGH", and "CRITICAL".
Examples
Show secrets of this severity.
severity: "HIGH"
andand
Use a boolean query to express your query using AND logic.
Example
Show events with type Standard and with action Allow
eventType: STANDARD and action: ALLOW
notnot
Use a boolean query to express your query using NOT logic.
Example
Show events that don't have Deny action
not action: DENY
oror
Use a boolean query to express your query using OR logic.
Example
Show events with one of these actions
action: ALLOW or action: MONITOR