GitHub Repository Security Analyzer
扫描公开的 GitHub 仓库,检测泄露的密钥、易受攻击的依赖项、缺失的 CI/CD 流水线和安全配置错误。免费使用,无需注册。
How It Works
Enter a public GitHub repository in the format owner/repo or a full GitHub URL. The analyzer:
- Fetches repository metadata via the GitHub REST API.
- Downloads and reads the actual content of sensitive files (
.env,package.json,.gitignore, source files). - Runs 22+ regex patterns across file contents to detect exposed secrets.
- Checks branch protection rules and Dependabot alert status via the API.
- Calculates a score (0–100) and assigns a grade A–F based on findings.
Only public repositories are supported. Private repositories return a 404 and cannot be analyzed.
What We Check
Six independent checks, each with a severity and score deduction if issues are found.
Reads .env files, source code, and config files for API keys, tokens, private keys, database URIs, and credentials using 22+ detection patterns.
Examples:
- →
AWS_SECRET_ACCESS_KEY, OPENAI_API_KEY - →
Private RSA/EC keys (-----BEGIN PRIVATE KEY-----) - →
Database connection strings with passwords - →
Stripe, Twilio, SendGrid API tokens
Parses package.json (and lock files when available) to flag known vulnerable or unmaintained packages.
Examples:
- →
vm2 — arbitrary code execution (CVE-2023-29017) - →
lodash < 4.17.21 — prototype pollution - →
jsonwebtoken < 9.0.0 — weak algorithm bypass - →
node-fetch < 2.6.7 — SSRF vulnerability
Detects whether the repository has an automated build/test/deploy pipeline configured.
Examples:
- →
GitHub Actions (.github/workflows/) - →
CircleCI (.circleci/config.yml) - →
Travis CI (.travis.yml) - →
Jenkins (Jenkinsfile) - →
GitLab CI (.gitlab-ci.yml)
Checks via the GitHub API whether the default branch requires pull request reviews and blocks direct force pushes.
Examples:
- →
Require PR reviews before merging - →
Dismiss stale approvals on new commits - →
Block force pushes to main/master - →
Require status checks to pass
Verifies that sensitive files and directories are excluded from version control.
Examples:
- →
.env, .env.local, .env.production - →
node_modules/, vendor/ - →
*.key, *.pem, *.p12 certificates - →
.DS_Store, Thumbs.db
Audits repository hygiene and compliance files that signal a well-maintained, trustworthy project.
Examples:
- →
README.md — project documentation - →
LICENSE — open-source license file - →
SECURITY.md — vulnerability disclosure policy - →
CODEOWNERS — review responsibility - →
Dependabot alerts enabled
Score & Grades
Score starts at 100. Each issue deducts points based on severity. Multiple issues of the same type stack (e.g., three critical secrets found = −45 pts).
No secrets found, dependencies clean, CI/CD active, branch protection enabled. Exemplary security posture.
Minor issues only — perhaps a missing SECURITY.md or no Dependabot. Core security is solid.
Medium-severity gaps: no CI/CD, .gitignore missing sensitive patterns, or outdated dependencies.
High-severity issues found: vulnerable dependencies, no branch protection, or weak repository hygiene.
Exposed secrets or critical vulnerabilities detected. Immediate action required.
Repository Health Panel
Beyond the score, the analyzer displays a health panel with metadata about the repository.
Stars / ForksRepository popularity signals.Open Issues / PRsMaintenance activity indicator.Default BranchName of the primary branch being protected.Last CommitTimestamp of the most recent commit activity.LanguagePrimary programming language detected by GitHub.LicenseOpen-source license type, if present.Dependabot StatusWhether automated dependency alerts are enabled.CI/CD PlatformIdentified pipeline tool (GitHub Actions, CircleCI, etc.).Scanned FilesList of files actually read for secret detection.Privacy & Rate Limits
- Public repos only. Private repositories cannot be accessed.
- No data stored. Repository contents are analyzed in memory and never persisted on our servers.
- GitHub API rate limits. Unauthenticated requests are limited to 60/hour per IP. If you hit a rate limit, wait a few minutes and try again.
- File size limits. Files larger than 1 MB are skipped during secret scanning to avoid timeouts.
GitHub 仓库安全分析器 — AISeen Docs
扫描公开的 GitHub 仓库,检测泄露的密钥、易受攻击的依赖项、缺失的 CI/CD 流水线和安全配置错误。免费使用,无需注册。