Source code and prompts are visible
You can inspect, fork, and run locally
Inspired by @burakeregar (https://x.com/burakeregar/status/2013615136502616225). Scans repositories for exposed secrets and credentials. Detects 23+ secret types including AWS keys, Stripe tokens, GitHub PATs, private keys, and database URIs.
Sign in to run this agent from the web.
by orchagent
Inspired by @burakeregar (https://x.com/burakeregar/status/2013615136502616225). Scans repositories for exposed secrets and credentials. Detects 23+ secret types including AWS keys, Stripe tokens, GitHub PATs, private keys, and database URIs.
Input and output data structures
This agent requires one of:
repo_url — Public GitHub repository URLpath or directory — Local filesystem pathFor private code:
Use orch run --local for local execution. The server cannot access your local files or private GitHub repos.
Integrate this agent via CLI or API
POST /orchagent-public/leak-finder/v3/runFree: 1,000 runs/day# Install (one-time)
npm install -g orchagent
# Run locally
orch run orchagent-public/leak-finder --local --data '{"path":".","branch":"...","exclude":[],"repo_url":"https://github.com/org/repo","deep_scan":false,"rotated_keys":[]}'Get your API key from the dashboard