Public GitHub Repository Scan (Beta)
Overview
WhiteIntel’s Public GitHub Repository Scan feature helps detect exposed secrets, credentials, and sensitive information in public GitHub repositories. This extends your visibility beyond the dark web by monitoring open-source code bases for potential leaks that could compromise your organization or clients.
The scanner analyzes all branches and complete commit history of each repository to identify exposures early and reduce the risk of source code–based breaches.
⚠️ Currently available in Beta for Enterprise and Threat Intelligence license holders.
Availability by License
Enterprise
Up to 8 repositories
All branches
Full history
Yes
Jira, Slack
Threat Intelligence
Up to 16 repositories
All branches
Full history
Yes
Jira, Slack,
How It Works
Once enabled, WhiteIntel connects to our GitHub scanning engine and performs a full inspection of the selected repositories:
Crawls all branches and commit history for the specified public repository
Applies secret-detection rules (API keys, tokens, credentials, configuration leaks, etc.)
Correlates findings with WhiteIntel’s threat intelligence pipeline
Displays the results in your dashboard and provides CSV export for further analysis
Each finding includes:
Repository name and branch
File path and affected lines
Commit hash, author, and timestamp
Detected rule ID and matched pattern
Secrets
How to Use
Access
Log in to your WhiteIntel dashboard.
Go to Watchlists → GitHub Repository type.
Click Add Identifier.
Enter the public repository URL (e.g.,
https://github.com/organization/repo-name.git).Confirm to start scanning.
Viewing Results
Scan results appear under the Watchlist Events section with file paths, commit metadata, and matched secret patterns.
You can export the results as a CSV file by clicking Download CSV in the sidebar.
Results are updated periodically as new commits are detected.

Last updated