Bitbucket mark

Security for Bitbucket

Stop Sensitive Information from Getting Published on Bitbucket

Over 200,000 developers rely on Security for Bitbucket to audit, detect, and remove secrets from Bitbucket repositories.

Soteri Is Protecting Top Companies

Be Confident in Your Cloud

Without Soteri

  • Secrets get published
  • Attackers gain access to sensitive info
  • Financial damages in the billions of dollars
  • Damaged company reputation

With Soteri Scanning

  • Find sensitive info before hackers do
  • Protect PII and financial information
  • Comply with HIPAA and GDPR
  • Be proactive instead of reactive
Code scanning graphic with found vulnerabilities on Bitbucket

Enhanced Bitbucket Security

A plug-and-play Bitbucket security app that scans your Bitbucket repositories for sensitive information so that common mistakes are caught before they are exploited by attackers.

No need to worry about 3rd party vendor compliance or reliability since Soteri's secret scanning is hosted within your Bitbucket Data Center instance. Installation takes only 30 seconds.

How it Works

Three Easy Steps to Secure Bitbucket Data Center

Adding secret scanning to your security testing is simple with Security for Bitbucket.

1. Block

Put your security testing on autopilot with hooks to block dangerous commits.

Once the developer tries to push a commit, Bitbucket will reject the commit if a known vulnerability is present. Keep your Bitbucket repositories free of API keys, SSH keys, passwords, and much more!

2. Audit

Discover secrets with built-in and customizable scanning rules to audit existing commits.

It's vital to not only block new commits, but to use the secret scanning rules on existing code to prevent privilege escalation and data leaks.

3. Secure

Secure your systems to prevent data breaches by changing and removing your secrets.

View the docs for more info on handling discovered secrets.

Features

Built to Maximize Your Bitbucket Security

Hand with warning sign

Block Dangerous Commits

Enable the pre-receive hook to scan all commits for secrets. When a secret is found, the commit is rejected meaning it will never enter your Bitbucket repository. Find a false positive? Ignore it with a pragma.

Scanning for...
AWS_CLIENT_ID
GITHUB_KEY
SLACK_WEBHOOK
STRIPE_API_KEY
API badge
GENERIC_API_KEY
Eyes looking at code

Find Commonly Leaked Secrets, and Then Some

Have confidence in your Bitbucket secret scanning as 40+ secrets are automatically detected. Add unlimited custom rules (via regex) to detect other sensitive information. We automatically detect SSH keys, private keys, API keys, credentials, financial information, and much more.

Person looking at code

Downloadable Reports of Scan Findings

Export the secret scanning findings into a CSV that'll show each Bitbucket repository, branch, and name of the secret found (+9 other columns).

Project
Repository
Rule
Full Text
PROJECT_1
rep_1
AWS_CLIENT_ID
AWS=AKIA3WAXW7OO4MDJBUHX
PROJECT_1
rep_1
SHOPIFY_SECRETS
SHOPIFY=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
SERVICES
rep_2
GOOGLE_API_KEY
KEY=AIzaSyCLWjZ0_ETxgPOxH-gQYT9ODeWcBBZU5-Q
Scanning Bitbucket...
Exporting CSV...
Dev Secret Found...
Alerting Dev Team...
Checklist for protection

REST API for Scripting and Automation

Use the API to create automations that scan your Bitbucket repositories, download the results, and automatically notify people about them. For more complex workflows, you can automate the proper person/team depending on the secret found or where it was found.

More features

Enabled per repository, per project, or globally

Warn-only mode can notify about security issues without blocking commits

Trigger scans for a repo, a project, or the whole Bitbucket instance

Flexible workflows for false positives

Shield with lock

Privacy

We don't store or access your secrets.

Bitbucket Data Center

Soteri respects data sovereignty, ensuring your sensitive information remains secure, confined and never transmitted elsewhere. In other words, we don't phone home.

Security for Bitbucket FAQs

Here's more information about Security for Bitbucket.
Need something else? Start a chat in the bottom right.

Which secrets does Security for Bitbucket look for?

The software automatically detects over 40 secrets in git repositories. Here's a full list of the secrets we scan for. You can easily add additional rules in the UI using regex.

Is my code and data private?

Yes! Soteri respects data sovereignty, ensuring your sensitive information remains secure, confined and never transmitted elsewhere. In other words, we don't phone home.

Does this work with Bitbucket Cloud?

Not at this time, although we have it on our backlog to support Bitbucket Cloud secret scanning. We currently support Bitbucket Server and Data Center. If you want to scan Bitbucket Cloud, check out our Scanning Service which is an API you can integrate into your workflow that scans any service for security vulnerabilities.

Do you offer support?

Yes, 24 hours a day. Through our support portal you can get in touch with us, report a bug, suggest a feature, and more!

What happens if Security for Bitbucket finds sensitive data?

All secrets detected by a security scan should be considered compromised. We recommend changing the secret (e.g., reseting passwords or rotating API keys), removing it from source code, and enabling the pre-commit hook to prevent secrets from ending up in your git repository. Here are the full docs for more info.

Are secrets lurking in your code? Scan your repository now!