Install this package:
emerge -a dev-util/detect-secrets
If the package is masked, you can unmask it using the autounmask tool or standard emerge options:
autounmask dev-util/detect-secrets
Or alternatively:
emerge --autounmask-write -a dev-util/detect-secrets
<pkgmetadata> <maintainer type="person"> <email>spiderx@spiderx.dp.ua</email> <name>Vladimir Pavljuchenkov</name> </maintainer> <maintainer type="project"> <email>proxy-maint@gentoo.org</email> <name>Proxy Maintainers</name> </maintainer> <longdescription lang="en"> detect-secrets is an aptly named module for detecting secrets within a code base. However, unlike other similar packages that solely focus on finding secrets, this package is designed with the enterprise client in mind: providing a backwards compatible, systematic means of: Preventing new secrets from entering the code base, Detecting if such preventions are explicitly bypassed, and Providing a checklist of secrets to roll, and migrate off to a more secure storage. </longdescription> <upstream> <remote-id type="github">Yelp/detect-secrets</remote-id> <remote-id type="pypi">detect-secrets</remote-id> </upstream> </pkgmetadata>
| Type | File | Size | Versions |
|---|---|---|---|
| DIST | detect-secrets-1.5.0.gh.tar.gz | 308047 bytes | 1.5.0 |
| Type | File | Size |
|---|