Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Betterleaks: The Advanced Open-Source Secrets Scanner

Betterleaks: The Advanced Open-Source Secrets Scanner

Posted on March 16, 2026 By CWS

The cybersecurity landscape has witnessed the introduction of Betterleaks, a new open-source secrets scanner designed to scan directories, files, and Git repositories. Developed by the creator of Gitleaks, Betterleaks is sponsored by Aikido Security, and aims to provide a faster and more configurable solution for detecting exposed credentials.

Enhanced Features and Capabilities

Betterleaks serves as a direct replacement for its predecessor, Gitleaks, which has garnered over 26 million downloads. With the loss of administrative control over the Gitleaks repository, its creator embarked on developing an improved tool from scratch, resulting in Betterleaks. The tool retains full compatibility with existing command-line interface options, ensuring a seamless transition for users.

The tool operates under an MIT license and is maintained by a team of four security experts from notable companies such as Red Hat, Amazon, and RBC. This structure supports long-term project stability and encourages community-driven development.

Innovative Technological Advancements

Among its advancements, Betterleaks improves detection speed and accuracy. Version 1.0 introduces Token Efficiency Scanning, which utilizes BPE tokenization, achieving a 98.6% recall rate. This technique surpasses traditional entropy-based methods.

Furthermore, the tool incorporates Rule-Defined Validation via the Common Expression Language, simplifying rule creation for new service providers. Its architecture is based on Go, eliminating dependencies on CGO or Hyperscan, facilitating easy deployment across different environments.

Future Developments and Contributions

Looking ahead, the Betterleaks team plans to expand its functionality beyond Git repositories and files. Upcoming features include LLM-assisted secret classification, auto-revocation of exposed credentials, and permissions mapping to assess the impact of leaked secrets. Continuous rule expansion is encouraged through GitHub contributions.

Betterleaks is tailored for AI-driven development environments, offering utility for AI agents to automate the scanning of generated code or enhance bug bounty workflows. Its development team comprises professionals from RBC, Red Hat, and Amazon, ensuring robust project governance.

Available on GitHub, Betterleaks is part of Aikido’s suite of open-source security tools, promising a significant contribution to the cybersecurity community. Stay updated on cybersecurity news by following us on Google News, LinkedIn, and X.

Cyber Security News Tags:AI-driven development, Aikido Security, Betterleaks, Cybersecurity, Git repositories, Gitleaks, Open Source, parallel processing, secrets scanner, security teams, security tools, token efficiency

Post navigation

Previous Post: China-Linked Cyber Espionage Targets Asian Militaries
Next Post: Storm-2561 Targets VPN Users in Credential Theft Scheme

Related Posts

Chrome’s Gemini Flaw Risks User Privacy with Remote Access Chrome’s Gemini Flaw Risks User Privacy with Remote Access Cyber Security News
CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks Cyber Security News
RMM Tools: Vital for IT but Increasingly Misused by Hackers RMM Tools: Vital for IT but Increasingly Misused by Hackers Cyber Security News
Enhancing SOC Maturity with Integrated Threat Intelligence Enhancing SOC Maturity with Integrated Threat Intelligence Cyber Security News
Microsoft Patch Tuesday June 2025 Microsoft Patch Tuesday June 2025 Cyber Security News
71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks 71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark