Detect code leakage on public GitHub
GitGuardian natively monitors all the commits on public GitHub for secrets getting leaked.
As for real secrets, whenever a honeytoken ends up in a public GitHub repository, it will be detected by GitGuardian, and this will trigger specific events.
Events originating from the IP addresses of GitGuardian monitoring of public GitHub are marked as "publicly exposed", and as a result, the honeytoken itself will receive the same tag.
Publicly exposed honeytokens can be quickly identified and filtered from the honeytoken list.