License

Copyright (c) 2025 DevOps Guard

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to use and run the Software as is, subject to the following conditions:

The Software may not be modified, merged, decompiled, reverse-engineered, or disassembled.

The above copyright notice and this permission notice shall be included in all copies of the Software.

Neither the names of the copyright holders nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Secret Detection Rules

Basic Set of Rules

The extension includes a free, built-in set of basic secret detection rules designed to identify common security risks in your code. These rules detect patterns such as hardcoded API keys, passwords, and other sensitive information in various programming languages. By scanning your files during development, these rules help ensure that sensitive data does not unintentionally get committed to your version control system. This basic functionality is provided as a complimentary feature, making it accessible to all users who install the extension.

Extended Set of Rules
For users requiring more comprehensite or custom set of rules we suggest to submit a feature request. If there is enough demand we might offer premium verison of rules or extended functionaly.