Home

Searching for Secrets

Use the search tokens below to search for secrets detected for an image. Looking for help with writing your query? click here

categorycategory

Use a text value ##### to specify the category of secrets.

Example

Show secrets associated with this category.

category: AsymmetricPrivateKey

filePathfilePath

Use a text value ##### to specify a filepath.

Example

Show secrets associated with this file.

filePath: root/test.pem

layerShalayerSha

Use a text value ##### to specify the SHA value of the image layer in which the secret was detected.

Example

Show secrets detected in this image layer.

layerSha: sha2563d762ca8378d40f3029bb10de71ec98652580cb8859248250d812bede6998505

secretTypesecretType

Use a text value ##### to specify the name of the secret detector.

Example

Show secrets detected by this secret detector.

secretType: 'LinkedIn Client Id'

severityseverity

Use a test value ##### to specify the severity of the secret. The valid values are "LOW", "MEDIUM", "HIGH", and "CRITICAL".

Examples

Show secrets of this severity.

severity: "HIGH"

andand

Use a boolean query to express your query using AND logic.

Example

Show events with type Standard and with action Allow

eventType: STANDARD and action: ALLOW

notnot

Use a boolean query to express your query using NOT logic.

Example

Show events that don't have Deny action

not action: DENY

oror

Use a boolean query to express your query using OR logic.

Example

Show events with one of these actions

action: ALLOW or action: MONITOR