Titus is a high-performance secrets scanner that detects credentials, API keys, and tokens in source code, files, and git history. It ships with 459 detection rules covering hundreds of services and credential types, drawn from NoseyParker and Kingfisher. Titus runs as a CLI, a Go library, a Burp Suite extension, and a Chrome browser extension — all sharing the same detection engine and rule set.
Built for security engineers, penetration testers, and DevSecOps teams, Titus combines Hyperscan/Vectorscan-accelerated regex matching with live credential validation to find and verify leaked secrets across your entire codebase.
- Why Titus?
- Installation
- Quick Start
- Scanning Options
- Go Library
- Burp Suite Extension
- Browser Extension
- Building from Source
- Contributing
- License
- Fast secrets scanning: Regex matching accelerated by Hyperscan/Vectorscan when available, with a pure-Go fallback for portability on any platform.
- Broad credential detection coverage: 459 rules detect API keys, tokens, and credentials for AWS, GCP, Azure, GitHub, Slack, databases, CI/CD systems, and hundreds more services.
- Live secret validation: Detected secrets are checked against their source APIs to confirm whether they are active, reducing false positives and prioritizing remediation.
- Multiple interfaces for every workflow: Scan from the CLI, embed as a Go library, passively scan HTTP traffic in Burp Suite, or scan web pages in Chrome during application security testing.
- Binary file extraction: Extract and scan secrets from Office documents, PDFs, archives (zip, tar, 7z), mobile apps (APK, IPA), browser extensions, and more.
Download a prebuilt binary from the Releases page, or build from source:
make buildThe binary will be at dist/titus.
# Scan a file for secrets
titus scan path/to/file.txt
# Scan a directory for leaked credentials
titus scan path/to/directory
# Scan git history for secrets in past commits
titus scan --git path/to/repo
# Scan a GitHub repository via API (no clone required)
titus github owner/repo --token $GITHUB_TOKEN
# Validate detected secrets against source APIs
titus scan path/to/code --validateResults are written to a datastore (titus.ds by default) and printed to the console.
Use report to re-read findings from a previous scan:
# Human-readable summary of detected secrets
titus report
# JSON output for programmatic processing
titus report --format json
# SARIF output for CI/CD integration with GitHub Advanced Security
titus report --format sarif
# Report from a specific datastore
titus report --datastore path/to/titus.dsYou can also control the output format at scan time with --format:
titus scan path/to/code --format jsonPass --validate during a scan to check detected secrets against their source APIs:
titus scan path/to/code --validateValidation runs concurrently (4 workers by default, configurable with --validate-workers) and marks each finding as confirmed, denied, or unknown.
# List all available detection rules
titus rules list
# Scan with only specific rules (e.g., AWS and GCP credentials)
titus scan path/to/code --rules-include "aws,gcp"
# Exclude rules by pattern
titus scan path/to/code --rules-exclude "kingfisher.generic"
# Use a custom rules file for organization-specific secrets
titus scan path/to/code --rules path/to/custom-rules.yamlTitus can extract text from binary file formats and scan the contents for secrets:
# Extract and scan all supported binary formats
titus scan path/to/files --extract=all
# Target specific formats
titus scan path/to/files --extract=xlsx,docx,pdf,zipSupported formats include Office documents (xlsx, docx, pptx, odp, ods, odt), PDFs, Jupyter notebooks, SQLite databases, email (eml, rtf), and archives (zip, tar, tar.gz, jar, war, ear, apk, ipa, crx, xpi, 7z). Archives are recursively extracted up to configurable depth and size limits.
# Tune extraction limits for large codebases
titus scan path/to/files --extract=all \
--extract-max-size 10MB \
--extract-max-total 100MB \
--extract-max-depth 5Titus can be imported as a Go library to add secrets detection to your own tools and pipelines.
go get github.com/praetorian-inc/tituspackage main
import (
"fmt"
"log"
"github.com/praetorian-inc/titus"
)
func main() {
// Initialize the secrets scanner with default rules
scanner, err := titus.NewScanner()
if err != nil {
log.Fatal(err)
}
defer scanner.Close()
// Scan a string for API keys, tokens, and credentials
matches, err := scanner.ScanString(`aws_access_key_id = AKIAIOSFODNN7EXAMPLE`)
if err != nil {
log.Fatal(err)
}
for _, match := range matches {
fmt.Printf("%s (rule: %s) at line %d\n",
match.RuleName, match.RuleID,
match.Location.SourceSpan.Start.Line,
)
}
}The library also supports scanning bytes and files, validating detected secrets, and loading custom rules:
// Scan a file for leaked credentials
matches, err := scanner.ScanFile("/path/to/config.json")
// Enable validation to check if detected secrets are live
scanner, err := titus.NewScanner(titus.WithValidation())
// Load custom detection rules for organization-specific secrets
rules, err := titus.LoadRulesFromFile("/path/to/rules.yaml")
scanner, err := titus.NewScanner(titus.WithRules(rules))See docs/library-usage.md for the full API reference, concurrency patterns, and more examples.
The Burp extension scans HTTP responses for secrets during proxy traffic and active penetration testing.
# Build the secrets scanner CLI and Burp extension JAR, install CLI to ~/.titus/
make install-burpThen load dist/titus-burp-1.0.0-all.jar in Burp Suite under Extensions > Add.
The extension launches a titus serve process in the background and communicates over stdin/stdout using NDJSON. Detection rules are loaded once at startup.
- Passive secret scanning: automatically scans proxy traffic as it flows through Burp
- Active secret scanning: right-click context menu to scan selected requests
- Deduplication: same secret is reported only once per engagement
- Fast-path filtering: binary content, images, and non-text responses are skipped
- Live credential validation: check detected secrets against source APIs to confirm if they're active
- False positive management: mark findings as false positives to filter noise
- Severity classification: findings color-coded by risk (High/Medium/Low)
- Export: save findings to JSON for reporting
The extension adds a Titus tab to Burp with three sub-tabs:
Secrets: All detected secrets with filtering by type, host, and validation status.
- Validation status: Shows whether secrets have been checked (Active/Inactive/Unknown)
- Filtering: Click Type, Host, or Status buttons to filter by specific values; use the search box for text and regex matching
- Bulk actions: Select multiple rows to validate or mark as false positive in batch
- Secret Details panel: Select a finding to view:
- Details: Rule info, category, full secret value, first seen timestamp
- URLs: All locations where this secret was found
- Validation: Validation result with details (e.g., AWS account ID, ARN)
- Request/Response: Full HTTP traffic with the secret highlighted
Statistics: Aggregate view of secrets grouped by type and host.
- Summary: Total unique secrets, hosts scanned, validation breakdown (active vs inactive), and false positive count
- Secrets by Type: Count of each secret type with category classification
- Secrets by Host: Number of secrets found per host
Settings: Configure scanning options, validation, and severity mappings.
- Scan Settings:
- Passive scanning: Automatically scan all proxy traffic (enabled by default)
- Request body scanning: Also scan request bodies for secrets sent by the application
- Validation: Enable to check secrets against source APIs (makes outbound requests and may trigger alerts)
- Scan Parameters: Worker threads, max file size, context snippet length
- Severity Configuration: Customize severity levels per secret category
- Actions: Clear cache, reset settings, save/export findings to JSON
When viewing any request in Burp, a Titus tab appears in the response inspector if secrets are detected, providing quick access to findings without switching to the main Titus tab.
The Chrome extension scans web pages for secrets during web application security assessments.
make build-extension- Navigate to
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the
extension/directory
- Scans inline and external JavaScript and stylesheets for API keys and tokens
- Scans localStorage and sessionStorage for leaked credentials
- Optional network response capture for comprehensive secret detection
- Results displayed in popup and dashboard
The browser extension removes Content Security Policy and CORS headers from visited pages to scan external resources. This weakens the security posture of sites you visit while the extension is active. Only enable during active security testing.
The default build uses a pure-Go regex engine — no C dependencies required:
# Build the CLI binary (outputs to dist/titus)
make build
# Build the Burp Suite extension JAR
make build-burp
# Build the Chrome browser extension
make build-extension
# Run unit tests
make test
# Run integration tests
make integration-testFor significantly faster regex matching, build with Vectorscan (ARM) or Hyperscan (x86). This requires the C library installed and CGO enabled.
Install Vectorscan:
# macOS (Homebrew)
brew install vectorscan
# Ubuntu/Debian
sudo apt-get install libhyperscan-dev
# Fedora/RHEL
sudo dnf install hyperscan-devel
# Or build from source:
git clone --depth 1 --branch vectorscan/5.4.11 https://github.com/VectorCamp/vectorscan.git
cd vectorscan && cmake -B build -DCMAKE_INSTALL_PREFIX=/usr/local && cmake --build build && sudo cmake --install buildBuild with Vectorscan:
# macOS (Homebrew) — adjust PKG_CONFIG_PATH to your installed version
CGO_ENABLED=1 PKG_CONFIG_PATH="$(brew --prefix vectorscan)/lib/pkgconfig" \
go build -tags vectorscan -o dist/titus ./cmd/titus
# Linux (system-installed)
CGO_ENABLED=1 go build -tags vectorscan -o dist/titus ./cmd/titusYou'll see [vectorscan] N/N rules compiled for Hyperscan on startup when the accelerated engine is active. Without vectorscan, Titus falls back to the pure-Go regex engine automatically.
Contributions are welcome! See CONTRIBUTING.md for guidelines on how to contribute to Titus.
Apache License 2.0 — see LICENSE.
Detection rules are derived from NoseyParker (Praetorian Security, Inc.) and Kingfisher (MongoDB, Inc.), both licensed under Apache 2.0. See NOTICE for full attribution.