Over 200,000 developers rely on Security for Bitbucket to audit, detect, and remove secrets from Bitbucket repositories.
With Soteri Scanning
A plug-and-play Bitbucket security app that scans your Bitbucket repositories for sensitive information so that common mistakes are caught before they are exploited by attackers.
No need to worry about 3rd party vendor compliance or reliability since Soteri's secret scanning is hosted within your Bitbucket Data Center instance. Installation takes only 30 seconds.
Three Easy Steps to Secure Bitbucket Data Center
Adding secret scanning to your security testing is simple with Security for Bitbucket.
Put your security testing on autopilot with hooks to block dangerous commits.
Once the developer tries to push a commit, Bitbucket will reject the commit if a known vulnerability is present. Keep your Bitbucket repositories free of API keys, SSH keys, passwords, and much more!
Discover secrets with built-in and customizable scanning rules to audit existing commits.
It's vital to not only block new commits, but to use the secret scanning rules on existing code to prevent privilege escalation and data leaks.
Secure your systems to prevent data breaches by changing and removing your secrets.
View the docs for more info on handling discovered secrets.
Built to Maximize Your Bitbucket Security
Block Dangerous Commits
Enable the pre-receive hook to scan all commits for secrets. When a secret is found, the commit is rejected meaning it will never enter your Bitbucket repository. Find a false positive? Ignore it with a pragma.
Find Commonly Leaked Secrets, and Then Some
Have confidence in your Bitbucket secret scanning as 40+ secrets are automatically detected. Add unlimited custom rules (via regex) to detect other sensitive information. We automatically detect SSH keys, private keys, API keys, credentials, financial information, and much more.
Downloadable Reports of Scan Findings
Export the secret scanning findings into a CSV that'll show each Bitbucket repository, branch, and name of the secret found (+9 other columns).
REST API for Scripting and Automation
Use the API to create automations that scan your Bitbucket repositories, download the results, and automatically notify people about them. For more complex workflows, you can automate the proper person/team depending on the secret found or where it was found.
Enabled per repository, per project, or globally
Warn-only mode can notify about security issues without blocking commits
Trigger scans for a repo, a project, or the whole Bitbucket instance
Flexible workflows for false positives
Bitbucket Data Center
Soteri respects data sovereignty, ensuring your sensitive information remains secure, confined and never transmitted elsewhere. In other words, we don't phone home.
Security for Bitbucket FAQs
Here's more information about Security for Bitbucket.
Need something else? Start a chat in the bottom right.
Which secrets does Security for Bitbucket look for?
The software automatically detects over 40 secrets in git repositories. Here's a full list of the secrets we scan for. You can easily add additional rules in the UI using regex.
Is my code and data private?
Yes! Soteri respects data sovereignty, ensuring your sensitive information remains secure, confined and never transmitted elsewhere. In other words, we don't phone home.
Does this work with Bitbucket Cloud?
Not at this time, although we have it on our backlog to support Bitbucket Cloud secret scanning. We currently support Bitbucket Server and Data Center. If you want to scan Bitbucket Cloud, check out our Scanning Service which is an API you can integrate into your workflow that scans any service for security vulnerabilities.
Do you offer support?
Yes, 24 hours a day. Through our support portal you can get in touch with us, report a bug, suggest a feature, and more!
What happens if Security for Bitbucket finds sensitive data?
All secrets detected by a security scan should be considered compromised. We recommend changing the secret (e.g., reseting passwords or rotating API keys), removing it from source code, and enabling the pre-commit hook to prevent secrets from ending up in your git repository. Here are the full docs for more info.