Network shares become credential graveyards
Legacy folders, project handovers, scripts, exports and operational notes often contain secrets that nobody owns anymore.
Enterprise Secrets Exposure Intelligence
Onyxaris helps security teams discover passwords, API keys, tokens, private keys, connection strings and other sensitive technical artifacts hidden across network shares, repositories, OneDrive, SharePoint and enterprise file stores.
Source: Project handover library · Confidence: High · Exposure: Broad internal access
The problem
Credentials are copied into deployment notes, exported into spreadsheets, stored in ZIP archives, pasted into troubleshooting documents, left in legacy file shares and synced through collaboration platforms.
Legacy folders, project handovers, scripts, exports and operational notes often contain secrets that nobody owns anymore.
OneDrive and SharePoint make it easy to share files, but they also make it easy for sensitive technical artifacts to spread beyond their intended audience.
Git secret scanning is important, but it does not cover archives, documentation, backups, shared drives or files created outside engineering workflows.
Finding a string that looks like a secret is only the beginning. Teams need ownership, source, exposure, confidence and remediation priority.
What Onyxaris does
Onyxaris scans organizational resources to detect exposed secrets and risky technical artifacts, then turns raw findings into prioritized, actionable visibility.
Identify passwords, API keys, access tokens, private keys, certificates, service account credentials, database connection strings and cloud access keys.
Explore → CoverageCover network shares, file servers, Git repositories, OneDrive, SharePoint, archives, documents, scripts, exports and configuration files.
Explore → RiskCombine secret type, file context, source, exposure level, confidence and potential impact into a risk-based view.
Explore → SignalUse detection rules, entropy checks, contextual analysis and validation-ready workflows to distinguish noise from real exposure.
Explore → ContextUnderstand where sensitive artifacts are located, how they are distributed and which business or technical area may own them.
Explore → WorkflowCreate evidence, assign ownership, track status and help teams rotate, remove or secure exposed credentials.
Explore →Coverage
Onyxaris focuses on technical secrets and sensitive access artifacts. Broad personal data detection is not the primary scope at this stage.
| Source | What Onyxaris looks for | Why it matters |
|---|---|---|
| Network shares | Scripts, configs, exports, password files, archives | High-volume unmanaged storage often ignored by AppSec tools |
| Git repositories | Hardcoded secrets, history, config files | Developer workflows still leak credentials |
| OneDrive | Shared documents, synced files, exported configs | Personal and team storage can expand exposure quickly |
| SharePoint | Libraries, project sites, shared folders | Business collaboration often contains technical handover data |
| Archives & backups | ZIP, 7z, tar and backup packages | Secrets remain hidden inside packaged files |
Workflow
Add network locations, repositories, OneDrive, SharePoint or other enterprise resources to the monitored scope.
Analyze files, metadata, selected histories and supported archives for patterns that indicate exposed secrets.
Link each finding with source, path, file type, detection category, confidence, exposure indicators and ownership signals.
Move from raw alerts into a risk-based remediation workflow that teams can assign, export and track.
Resource hub
A practical guide to secret scanning, common secret types, detection logic and enterprise use cases.
Explore → ComparisonUnderstand how focused credential exposure detection differs from broad data loss prevention.
Explore → PlaybookA practical workflow for rotating, revoking, removing and documenting exposed credentials.
Explore →Explore the site
Exposed API keys
Hardcoded passwords
Database connection strings
Cloud access keys
Service account credentials
Certificates & private keys
Pre-audit risk discovery
What is secret scanning?
Secret scanning vs DLP
Why network shares leak secrets
Remediation playbook
Maturity model
Secret types
OneDrive secret risk
SharePoint credential exposure
Git history secret leaks
Risk scoring for secrets
Secret scanning checklist
Network share database passwords
SharePoint external exposure
Git history cloud keys
Pre-audit secrets discovery
Start focused
Start with a focused exposure assessment across your highest-risk sources: network shares, repositories, OneDrive or SharePoint.