Announcement

Introducing Probe! Cremit's New Detection Engine

Probe detects exposed credentials and sensitive data across cloud tools, automating validation and alerts, with AI-powered scanning for enhanced security.

The challenges of managing credentials

Non-Human Identities such as API keys and passwords are essential for accessing services in modern, cloud-based, and collaborative work environments. Yet, as employees often store these credentials in easily accessible places (like code repositories, messengers, and cloud documents) to boost work speed, the risk of exposure has grown, leading to high-profile breaches at companies like Okta, Microsoft, Uber, and CloudFlare.

To address this, tools like TruffleHog and GitGuardian have emerged. TruffleHog, an open-source solution, scans source code and collaboration platforms using regex patterns to validate different credential types. However, its reliance on preset patterns limits its ability to detect new credential types or sensitive information beyond its scope, and it only scans one source at a time. GitGuardian, a SaaS-based service, provides real-time alerts and reporting across various cloud products but struggles with scalability and customization—especially when detecting personally identifiable information (PII). These limitations set the stage for a more robust secret detection solution.

Introducing Probe


A probe is a spacecraft designed to explore space and collect data on planets, moons, and asteroids. Similarly, Probe is our product that explores the cloud to detect exposed credentials. Unlike existing solutions, Probe overcomes key limitations to deliver comprehensive security. Key features include:

  1. Support for Multiple Collaboration Tools
    Probe scans source code repositories and various collaboration tools like Slack, Jira, Confluence, and Notion. This ensures comprehensive detection of credential exposure risks across day-to-day workflows, not just during development.
  2. Broad Credential Detection and Validation
    Probe detects 800+ types of credentials and automatically validates their validity. This reduces false positives, allowing security teams to focus on genuine threats.
  3. Multi-Source Scanning
    Probe can simultaneously scan and validate credentials across multiple sources. This capability ensures efficient detection and validation, even for large organizations.
  4. AI-Powered Sensitive Data Detection
    Beyond credentials, Probe leverages AI to detect sensitive data such as Personally Identifiable Information (PII). By using models optimized for natural language and code analysis, Probe achieves high accuracy in detection.
  5. Dashboard and Alerting Support
    Probe features an intuitive web dashboard for tracking credential detection status. It also provides real-time notifications via Slack, Telegram and other messengers, enabling quick responses to potential issues.


Probe’s features help overcome the limitations of traditional credential detection tools, with advanced credential verification, AI-powered sensitive data detection, and multi-source scanning, taking your security to the next level.

Probe also delivers significant performance advantages over other products. Speed is critical for responding quickly to credential exposure threats. Built in Rust, Probe leverages efficient string search algorithms and advanced optimizations to detect credentials swiftly, even in large datasets.

Bar charts comparing Cremit-Ferret (blue) and Trufflehog (orange) performance on 3 benchmarks.

Probe significantly outperformed TruffleHog in scan speed across various environments, including Linux, Chromium, and Spring Boot. On average, Probe was 2x faster when scanning codebases and up to 8.8x faster for large projects like Chromium. This enhanced speed enables faster responses to credential exposures and greatly improves the efficiency of credential detection in large organizations.

Future Plans

Probe is continually evolving to deliver even greater value to our customers. Here’s what’s coming next:

  • Expanded Support for Collaboration Tools and Detection Types
    While Probe already supports a wide range of tools, we plan to include more cloud collaboration platforms, enabling customers to adapt Probe to their unique workflows. Additionally, we aim to extend detection capabilities to cover credentials in non-text data, such as images.
  • Custom Detection and Validation Rules
    Probe will allow users to define specialized credential detection and validation rules, such as identifying internal usernames and passwords. This flexibility will improve scalability and security for organizations with unique needs.
  • Credential Metadata Collection and Management
    New features will enable the collection and utilization of credential metadata to assess exposure scope and threat levels. This will streamline credential management for security teams and enhance efficiency.
  • AI Model Diversification and Performance Improvements
    We plan to further diversify Probe’s AI models and enhance their performance, delivering more accurate and versatile detection of sensitive data.
  • Automatic Credential Action Capabilities
    To respond swiftly to breaches, Probe will develop features to automatically change or deactivate exposed credentials, ensuring quick and effective mitigation.
  • Credential Archiving and Usage
    Probe will provide secure storage and seamless management of detected credentials, enabling organizations to handle the entire credential lifecycle within Cremit.

Let's Get Started

Cremit offers both SaaS and On-Premise (Enterprise) solutions optimized for startups, small businesses, enterprises, and finance sectors. With support for 800+ secret validations, NER-based privacy detection, and integrations for source code, collaboration tools, documents, and repositories, we empower organizations to enhance their security posture.

Contact Us Now

Unlock AI-Driven Insights to Master Non-Human Identity Risk.

Go beyond basic data; unlock the actionable AI-driven insights needed to proactively master and mitigate non-human identity risk

A dark-themed cybersecurity dashboard from Cremit showing non-human identity (NHI) data analysis. Key metrics include “Detected Secrets” (27 new) and “Found Sensitive Data” (58 new) from Jan 16–24, 2024. Two donut charts break down source types of detected secrets and sensitive data by platform: GitHub (15k), GetResponse (1,352), and Atera (352), totaling 16.9k. The dashboard includes a line graph showing trends in sensitive data over time, and bar charts showing the top 10 reasons for sensitive data detection—most prominently email addresses and various key types (API, RSA, PGP, SSH).

Blog

Explore more news & updates

Stay informed on the latest cyber threats and security trends shaping our industry.

OWASP NHI5:2025 Insecure Authorization Deep Dive
Explore OWASP NHI5: Insecure Authorization. See how Non-Human Identities gain excess privileges, causing breaches. Learn countermeasures like Zero Trust & least privilege.
OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans
Deep dive into OWASP NHI4: Insecure Authentication. Understand the risks of NHIs, key vulnerabilities, and how Zero Trust helps protect your systems.
Secret Sprawl and Non-Human Identities: The Growing Security Challenge
Discover NHI sprawl vulnerabilities and how Cremit's detection tools safeguard your organization from credential exposure. Learn to manage NHI risks.
Navigating the Expanding AI Universe: Deepening Our Understanding of MCP, A2A, and the Imperative of Non-Human Identity Security
Delve into AI protocols MCP & A2A, their potential security risks for AI agents, and the increasing importance of securing Non-Human Identities (NHIs).
Stop Secrets Sprawl: Shifting Left for Effective Secret Detection
Leaked secrets threaten fast-paced development. Learn how Shift Left security integrates early secret detection in DevOps to prevent breaches & cut costs.
Hidden Dangers: Why Detecting Secrets in S3 Buckets is Critical
Learn critical strategies for detecting secrets in S3 buckets. Understand the risks of exposed NHI credentials & why proactive scanning is essential.
NHI2 2025: Secret Leakage – Understanding and Mitigating the Risks
NHI2 Secret Leakage: Exposed API keys and credentials threaten your business. Learn how to prevent unauthorized access, data breaches, and system disruption.
Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection
Cremit Launches AWS S3 Non-Human Identity (NHI) Detection to Boost Cloud Security
Human vs. Non-Human Identity: The Key Differentiators
Explore the critical differences between human and non-human digital identities, revealing hidden security risks and the importance of secret detection.
Wake-Up Call: tj-actions/changed-files Compromised NHIs
Learn from the tj-actions/changed-files compromise: CI/CD non-human identity (NHI) security risks, secret theft, and proactive hardening.
NHI 3 2025: 3rd Party Supply Chain Dangers
Discover the security risks of vulnerable third-party non-human identities (NHI3:2025) and learn effective strategies to protect your organization from this OWASP Top 10 threat.
Build vs. Buy: Making the Right Choice for Secrets Detection
Build vs. buy secrets detection: our expert guide compares costs, features, and ROI for in-house and commercial security platforms.
Bybit Hack Analysis: Strengthening Crypto Exchange Security
Bybit hacked! $1.4B crypto currency stolen! Exploited Safe{Wallet}, API key leak, AWS S3 breach? Exchange security is at stake! Check your security now!
Rising Data Breach Costs: Secret Detection's Role
Learn about the growing financial impact of data breaches and how secret detection and cybersecurity strategies can safeguard your data and business.
NHI1 2025: Improper Offboarding- A Comprehensive Overview
Discover how improper offboarding exposes credentials, leading to vulnerabilities like NHI sprawl, attack surface expansion, and compliance risks.
Behind the Code: Best Practices for Identifying Hidden Secrets
Improve code security with expert secret detection methods. Learn strategies to safeguard API keys, tokens, and certificates within your expanding cloud infrastructure.
Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats
Understanding NHI OWASP Top 10: risks to non-human identities like APIs and keys. Covers weak authentication, insecure storage, and more.
Securing Your Software Pipeline: The Role of Secret Detection
Prevent secret leaks in your software pipeline. Discover how secret detection improves security, safeguards CI/CD, and prevents credential exposure.
What Is Secret Detection? A Beginner’s Guide
Cloud security demands secret detection. Learn its meaning and why it's essential for protecting sensitive data in today's cloud-driven organizations.
Full Version of Nebula – UI, New Features, and More!
Explore the features in Nebula’s full version, including a refined UI/UX, fine-grained access control, audit logs, and scalable plans for teams of all sizes.
Unveiling Nebula: An Open-Source MA-ABE Secrets Vault
Nebula is an open-source MA-ABE secrets vault offering granular access control, enhanced security, and secret management for developers and teams.
Vigilant Ally: Helping Developers Secure GitHub Secrets
The Vigilant Ally Initiative supports developers secure API keys, tokens, and credentials on GitHub, promoting secure coding and secrets management.
Cremit Joins AWS SaaS Spotlight Program
Cremit joins the AWS SaaS Spotlight Program to gain insights through mentorship and collaboration, driving innovation in AI-powered security solutions.
DevSecOps: Why start with Cremit
DevSecOps is security into development, improving safety with early vulnerability detection, remediation, and compliance, starting with credential checks.
Credential Leakage Risks Hiding in Frontend Code
Learn why credentials like API keys and tokens are critical for access control and the risks of exposure to secure your applications and systems effectively.
Introducing Probe! Cremit's New Detection Engine
Probe detects exposed credentials and sensitive data across cloud tools, automating validation and alerts, with AI-powered scanning for enhanced security.
Customer Interview: Insights from ENlighten
We interviewed Jinseok Yeo from ENlighten, Korea’s top energy IT platform, on how they secure credentials and secrets. Here’s their approach to security.
6 Essential Practices for Protecting Non-Human Identities
Safeguard your infrastructure: Learn 6 best practices to protect API keys, passwords & encryption keys with secure storage, access controls & rotation.
Microsoft Secrets Leak: A Cybersecurity Wake-Up Call
See how an employee error at Microsoft led to the exposure of sensitive secrets and 38 terabytes of data.