Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Betterleaks: The Advanced Open-Source Secrets Scanner

Betterleaks: The Advanced Open-Source Secrets Scanner

Posted on March 16, 2026 By CWS

The cybersecurity landscape has witnessed the introduction of Betterleaks, a new open-source secrets scanner designed to scan directories, files, and Git repositories. Developed by the creator of Gitleaks, Betterleaks is sponsored by Aikido Security, and aims to provide a faster and more configurable solution for detecting exposed credentials.

Enhanced Features and Capabilities

Betterleaks serves as a direct replacement for its predecessor, Gitleaks, which has garnered over 26 million downloads. With the loss of administrative control over the Gitleaks repository, its creator embarked on developing an improved tool from scratch, resulting in Betterleaks. The tool retains full compatibility with existing command-line interface options, ensuring a seamless transition for users.

The tool operates under an MIT license and is maintained by a team of four security experts from notable companies such as Red Hat, Amazon, and RBC. This structure supports long-term project stability and encourages community-driven development.

Innovative Technological Advancements

Among its advancements, Betterleaks improves detection speed and accuracy. Version 1.0 introduces Token Efficiency Scanning, which utilizes BPE tokenization, achieving a 98.6% recall rate. This technique surpasses traditional entropy-based methods.

Furthermore, the tool incorporates Rule-Defined Validation via the Common Expression Language, simplifying rule creation for new service providers. Its architecture is based on Go, eliminating dependencies on CGO or Hyperscan, facilitating easy deployment across different environments.

Future Developments and Contributions

Looking ahead, the Betterleaks team plans to expand its functionality beyond Git repositories and files. Upcoming features include LLM-assisted secret classification, auto-revocation of exposed credentials, and permissions mapping to assess the impact of leaked secrets. Continuous rule expansion is encouraged through GitHub contributions.

Betterleaks is tailored for AI-driven development environments, offering utility for AI agents to automate the scanning of generated code or enhance bug bounty workflows. Its development team comprises professionals from RBC, Red Hat, and Amazon, ensuring robust project governance.

Available on GitHub, Betterleaks is part of Aikido’s suite of open-source security tools, promising a significant contribution to the cybersecurity community. Stay updated on cybersecurity news by following us on Google News, LinkedIn, and X.

Cyber Security News Tags:AI-driven development, Aikido Security, Betterleaks, Cybersecurity, Git repositories, Gitleaks, Open Source, parallel processing, secrets scanner, security teams, security tools, token efficiency

Post navigation

Previous Post: China-Linked Cyber Espionage Targets Asian Militaries
Next Post: Storm-2561 Targets VPN Users in Credential Theft Scheme

Related Posts

Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Cyber Security News
SonicWall Releases Firmware Update to Remove Rootkit Malware ‘OVERSTEP’ from SMA Devices SonicWall Releases Firmware Update to Remove Rootkit Malware ‘OVERSTEP’ from SMA Devices Cyber Security News
Hackers Allegedly Claim Breach Of HSBC USA Customers’ Records Including Financial Details Hackers Allegedly Claim Breach Of HSBC USA Customers’ Records Including Financial Details Cyber Security News
Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace Cyber Security News
China-linked APT24 Hackers New BadAudio Compromised Legitimate Public Websites to Attack Users China-linked APT24 Hackers New BadAudio Compromised Legitimate Public Websites to Attack Users Cyber Security News
China-Linked Hackers Target Linux Devices with Malware China-Linked Hackers Target Linux Devices with Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution
  • Vishing Attack Exploits Microsoft Teams for Quick Assist Breach
  • SEO Manipulation and Trojans Used to Steal VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution
  • Vishing Attack Exploits Microsoft Teams for Quick Assist Breach
  • SEO Manipulation and Trojans Used to Steal VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark