Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Betterleaks: The Advanced Open-Source Secrets Scanner

Betterleaks: The Advanced Open-Source Secrets Scanner

Posted on March 16, 2026 By CWS

The cybersecurity landscape has witnessed the introduction of Betterleaks, a new open-source secrets scanner designed to scan directories, files, and Git repositories. Developed by the creator of Gitleaks, Betterleaks is sponsored by Aikido Security, and aims to provide a faster and more configurable solution for detecting exposed credentials.

Enhanced Features and Capabilities

Betterleaks serves as a direct replacement for its predecessor, Gitleaks, which has garnered over 26 million downloads. With the loss of administrative control over the Gitleaks repository, its creator embarked on developing an improved tool from scratch, resulting in Betterleaks. The tool retains full compatibility with existing command-line interface options, ensuring a seamless transition for users.

The tool operates under an MIT license and is maintained by a team of four security experts from notable companies such as Red Hat, Amazon, and RBC. This structure supports long-term project stability and encourages community-driven development.

Innovative Technological Advancements

Among its advancements, Betterleaks improves detection speed and accuracy. Version 1.0 introduces Token Efficiency Scanning, which utilizes BPE tokenization, achieving a 98.6% recall rate. This technique surpasses traditional entropy-based methods.

Furthermore, the tool incorporates Rule-Defined Validation via the Common Expression Language, simplifying rule creation for new service providers. Its architecture is based on Go, eliminating dependencies on CGO or Hyperscan, facilitating easy deployment across different environments.

Future Developments and Contributions

Looking ahead, the Betterleaks team plans to expand its functionality beyond Git repositories and files. Upcoming features include LLM-assisted secret classification, auto-revocation of exposed credentials, and permissions mapping to assess the impact of leaked secrets. Continuous rule expansion is encouraged through GitHub contributions.

Betterleaks is tailored for AI-driven development environments, offering utility for AI agents to automate the scanning of generated code or enhance bug bounty workflows. Its development team comprises professionals from RBC, Red Hat, and Amazon, ensuring robust project governance.

Available on GitHub, Betterleaks is part of Aikido’s suite of open-source security tools, promising a significant contribution to the cybersecurity community. Stay updated on cybersecurity news by following us on Google News, LinkedIn, and X.

Cyber Security News Tags:AI-driven development, Aikido Security, Betterleaks, Cybersecurity, Git repositories, Gitleaks, Open Source, parallel processing, secrets scanner, security teams, security tools, token efficiency

Post navigation

Previous Post: China-Linked Cyber Espionage Targets Asian Militaries
Next Post: Storm-2561 Targets VPN Users in Credential Theft Scheme

Related Posts

Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Cyber Security News
AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars Cyber Security News
Golden SAML Attack Let Attackers Gains Control of The Private Keyused by Federation Server Golden SAML Attack Let Attackers Gains Control of The Private Keyused by Federation Server Cyber Security News
Airleader Vulnerability Poses Remote Code Execution Risk Airleader Vulnerability Poses Remote Code Execution Risk Cyber Security News
Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks Cyber Security News
Nevada IT Systems Hit by Cyberattack Nevada IT Systems Hit by Cyberattack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ubuntu Security Flaw CVE-2026-3888 Enables Root Access
  • Microsoft Pauses Automatic 365 Copilot App Installations
  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ubuntu Security Flaw CVE-2026-3888 Enables Root Access
  • Microsoft Pauses Automatic 365 Copilot App Installations
  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark