Secrets detection and non-human identity governance for modern engineering teams
GitGuardian is a Paris-based code security platform specialising in secrets detection and non-human identity (NHI) governance. It continuously scans source code repositories, CI/CD pipelines, containers, and developer workstations for exposed API keys, tokens, passwords, and certificates across 350+ detector types. Founded in 2017, it is listed on Fortune's Cyber 60 and has raised USD 106M in total funding, including a USD 50M Series C in 2026.
Headquarters
Paris, France
Founded
2017
Pricing
EU Data Hosting
Yes
Employees
51-200
30-day free trial available
Free
Contact Sales
Contact Sales
Billing: Annual, Multi-year
Secrets sprawl is quietly one of the most damaging security problems in modern software development. A developer commits an AWS key to a private repository, the repo becomes public six months later during a restructuring, and suddenly an attacker has cloud access. GitGuardian's entire existence is built around closing that gap — and after raising USD 50M in a Series C round in early 2026 and landing on Fortune's Cyber 60 list, the Paris-based company is no longer a niche tool. It is the reference platform for secrets security in Europe and increasingly in North America.
GitGuardian scans everywhere code lives for credentials that should not be there: API keys, OAuth tokens, database passwords, private certificates, SSH private keys, and 350+ other secret types. It monitors source code repositories (GitHub, GitLab, Bitbucket, Azure DevOps), CI/CD pipeline outputs, container images, infrastructure-as-code files, and developer workstations via its open-source ggshield CLI. When it finds a secret, it checks whether that secret is still valid — distinguishing live credentials that require immediate action from stale ones that may already be rotated.
The platform operates at two levels. The first is reactive: catching secrets that have already been committed and alerting the right people to remediate them. The second is preventive: enforcing pre-commit and pre-receive hooks that block secrets before they enter the repository in the first place. The combination significantly reduces both the blast radius and the frequency of credential leaks.
In 2026, GitGuardian has added a third pillar: non-human identity (NHI) governance. Modern software stacks run on machine identities — service accounts, automated API keys, CI/CD tokens — that far outnumber human credentials. GitGuardian's NHI module provides a centralised inventory of these identities across cloud IAM providers, secrets managers, and SaaS platforms including Okta, AWS, Snowflake, Datadog, and Auth0.
GitGuardian is built for scale. The perimeter monitoring capability scans all of public GitHub — billions of commits — in real time, alerting organisations when their secrets appear in public repositories. This means even a developer's personal account accidentally containing work credentials will generate an alert before the damage compounds.
The incident dashboard provides severity-weighted triage. Each detected secret comes with context: which repository, which commit, which developer, how long ago, and whether the secret is still valid. Security teams can assign incidents to developers, set remediation deadlines, and track closure without leaving the platform. For larger organisations, the CISO-level reporting shows secrets sprawl trends over time — a genuinely useful signal for security programme maturity conversations with leadership.
The historical scanning capability is underappreciated. GitGuardian can scan the entire commit history of a repository, not just new commits. For organisations inheriting codebases through acquisition or consolidation, this reveals credential exposure that may have been accumulating for years.
GitGuardian uses a freemium model with public pricing only for the free individual tier.
The Free plan is genuinely useful: unlimited repository scanning for individual developers, ggshield CLI for local pre-commit enforcement, and public GitHub monitoring. There is no feature-limited trial — individual developers get a real, production-capable tool at no cost indefinitely.
The Business plan covers development teams needing private repository scanning, CI/CD pipeline integration, and the incident management dashboard. Pricing is per-developer seat and requires a sales conversation — GitGuardian does not publish team rates. Buyers on procurement platforms report multi-year deal structures as common, with per-seat rates improving significantly at volume.
The Enterprise plan adds self-hosted deployment (for organisations where cloud SaaS is not permissible), the NHI governance module, advanced CISO reporting, and dedicated customer success management. It starts at 200 developers, positioning it firmly at the larger end of the market.
A 30-day trial is available for paid tiers.
Snyk and GitGuardian target overlapping audiences but with different primary concerns.
Snyk is an application security platform covering open-source vulnerabilities (SCA), static analysis (SAST), container image security, and infrastructure-as-code misconfiguration. Secrets detection is one feature within a broader suite. Snyk is UK-incorporated (though US-funded) and primarily cloud-based.
GitGuardian is purpose-built for one thing: ensuring credentials never end up where they should not be, and ensuring the ones that do are found and remediated fast. The 350+ detector library, validity checking, and NHI governance have no direct equivalent in Snyk's offering.
For engineering teams where credential exposure is the dominant security concern — particularly teams handling payment APIs, cloud infrastructure, or third-party SaaS integrations — GitGuardian's depth in its niche outperforms Snyk's breadth. For teams that need unified SAST, SCA, and container scanning alongside secrets detection, Snyk's broader coverage may justify adding GitGuardian as a complementary layer rather than a substitute.
The EU compliance distinction is clear: GitGuardian SAS is a French company with EU-hosted data processing and SOC 2 Type II certification. Snyk, despite UK incorporation, has a primarily US data infrastructure. For European organisations with data residency requirements, GitGuardian is the cleaner choice.
If your team works with cloud infrastructure APIs and external service integrations, GitGuardian's specificity is its value. The 350+ detectors know what an AWS key looks like, what a Stripe secret looks like, and can validate whether that Twilio token is still active. A generic secret scanner cannot do that.
If you are a DevSecOps team working to embed security into the developer workflow, ggshield's pre-commit enforcement and CI/CD integration fit naturally into shift-left programmes. Developers get actionable, immediate feedback rather than security tickets weeks after the fact.
If your organisation is subject to French or EU data protection requirements and wants a secrets security vendor with clean EU data processing, GitGuardian is the natural fit. No cross-border data transfer concerns, no complex Standard Contractual Clause arrangements.
If you are a solo developer or small team and want enterprise-grade secrets scanning at zero cost, the free tier is genuinely the best individual offering in this category.
Consider alternatives if you need a single platform covering open-source vulnerabilities, SAST, and container scanning alongside secrets detection — Snyk's breadth may serve you better, with GitGuardian potentially as a complement.
Business and Enterprise pricing opacity is a real friction point. GitGuardian does not publish team rates, requiring a sales engagement before any budget assessment. For organisations with procurement processes that expect a published price sheet, this is a genuine obstacle.
Self-hosted deployment is restricted to Enterprise at 200+ developers. Teams of 20 or 50 developers who cannot use cloud SaaS for compliance reasons have no self-hosted option below the Enterprise threshold — a gap that affects smaller regulated organisations.
The feature scope, while deep in secrets, is narrow by design. GitGuardian will not replace a full SAST tool, a container scanner, or a dependency vulnerability platform. Teams building out a security programme from scratch will need to combine it with other tools.
Community support is limited. There is no public forum or community knowledge base; peer support relies on documentation quality (which is excellent) and Slack channels available to enterprise customers.
GitGuardian occupies a well-defined and increasingly important position in the security tooling landscape. As AI-assisted development drives faster code production and more third-party API integrations, the surface area for secrets exposure grows proportionally — GitGuardian's 2026 State of Secrets Sprawl report documented an 81% surge in AI-service credential leaks on public GitHub. The platform's 350+ detectors, validity checking, NHI governance, and perimeter monitoring are purpose-built for this problem, and the free tier makes it accessible for individual developers who want real protection without a procurement process.
The pricing opacity at team scale and the Enterprise-only self-hosted option are genuine limitations. But for European organisations that need a credible, GDPR-native secrets security platform with Fortune Cyber 60 pedigree, GitGuardian is the strongest option on the market.
GitGuardian detects 350+ types of secrets including API keys for AWS, GCP, Azure, Stripe, and Twilio; OAuth tokens; database credentials; private certificates; and SSH keys. It also supports custom detector patterns. Validity checks confirm whether each detected secret is still active, helping teams prioritise remediation.
Yes. The Free plan covers individual developers with unlimited repository scanning, ggshield CLI for local pre-commit hooks, and real-time public GitHub monitoring. Team and enterprise features — private repos, CI/CD integration at scale, NHI governance — require paid plans.
GitGuardian's NHI governance module discovers and enumerates machine identities across cloud IAM providers, secrets managers, and SaaS platforms including Okta, AWS, Snowflake, Datadog, and Auth0. It provides a centralised inventory and visibility into all non-human credentials, which typically outnumber human credentials by a significant margin in modern organisations.
Yes. GitGuardian SAS is a French company headquartered in Paris with EU-based data processing. It has held SOC 2 Type II certification since 2022 and provides a Data Processing Addendum. The EU data processing model makes it a compliant choice for organisations subject to GDPR requirements without requiring additional contractual arrangements.
GitGuardian is purpose-built for secrets detection with 350+ specific detectors and validity checking — capabilities Snyk does not match in depth. Snyk covers a broader SAST surface including open-source dependencies and container images. Teams focused primarily on credential exposure choose GitGuardian; teams needing unified application security choose Snyk, potentially with GitGuardian as a complementary layer.
ggshield is GitGuardian's open-source CLI tool that runs locally on developer workstations. It integrates with Git pre-commit hooks to scan staged changes for secrets before they are committed, providing immediate feedback at the earliest point in the development workflow. It is free and open-source, available on GitHub.
Award-winning cybersecurity solutions for consumers and enterprises
Alternative to Norton, Mcafee, Crowdstrike
Client-side encryption for your cloud storage files
Alternative to Dropbox, Google Drive
Search, observability, and security platform built on Elasticsearch and the ELK Stack