Skip to main content

One post tagged with "ggshield"

View All Tags

Secret scanning for AI coding tools

calendar icon   Release Date: April 10, 2026

Secret scanning for AI coding tools

AI coding assistants like Cursor, Claude Code, and GitHub Copilot can now read files, run shell commands, and call external tools during a session. That makes them powerful, but it also means secrets can be exposed before code ever reaches a repository or CI pipeline. ggshield now scans AI interactions in real time and blocks secrets before they are sent to a model or executed.

What does this mean for you?

  • Prompt scanning: Secrets in your prompts are caught before they reach the AI model.
  • Tool call protection: File reads, shell commands, and MCP calls are scanned before the AI assistant executes them.
  • Post-action alerts: If a tool output contains secrets, you get a desktop notification so you can act immediately.
  • Simple setup: A single ggshield install command configures hooks for your tool of choice.

Why is this important?

Prompts, local file access, shell output, and MCP tool calls sit outside the controls that protect repositories and CI pipelines. A developer might paste an API key while debugging, or an AI agent might read a .env file and pass credentials to a model provider. These interactions are invisible to most security programs today. Secret scanning at the hook level closes that gap, giving security teams visibility and control over what flows through AI-assisted development workflows.

Get started

  1. Make sure you have ggshield 1.49.0 or later installed
  2. Run ggshield install -t <tool> -m global where <tool> is cursor, claude-code, or copilot
  3. Start coding: ggshield will automatically scan prompts and tool calls in the background

Check out the full setup guide to learn more.


Enhancements

  • Risk Score: Shipped an updated model that improves separation between low-risk noise and higher-priority findings; some incident scores may shift. Learn more.
  • Saved views: The Critical saved view is now the default when you open the Internal Monitoring incidents page. Learn more.
  • Public API:
    • Added privacy mode support, allowing users to control secret content visibility when retrieving secrets via API endpoints. Learn more.
    • Added new endpoints to trigger and cancel historical scans programmatically, enabling integration of scan management into automated workflows. Learn more.
    • Added severity_rule_id and detector category to the incident response - for both internal and public secret incidents.
    • Added a new GET /v1/severity-rules endpoint to list severity rules.
  • Authentication: The SSO domain is now remembered after logout, allowing users to reconnect with a single click instead of re-entering their domain each time.
  • Public exposure: "Found outside perimeter" leak details are now visible to all customers, regardless of Public Monitoring subscription. This allows users to better assess and qualify the signal as we continue to improve the reliability of this detection. Access to this information may evolve as the feature matures.

Fixes

  • Secrets Detection: Fixed an issue where ggshield could return an incorrect incident URL when two secrets shared the same hash across different repositories with the "Group by secret per source" enabled.
  • Analytics: Fixed an issue where the "All time" date range filter did not consistently cover all incidents, potentially causing some older incidents to be excluded from analytics views.
  • Jira Data Center Integration: Fixed an issue where Jira Data Center source connections could intermittently lose authentication.
  • Honeytoken: Fixed a deployment job failure caused by an encoding error when interacting with the GitLab API during honeytoken deployment.
  • Public API: Fixed an error when querying occurrences for public incidents originating from Explore Search.