Connect sources
Add selected repositories, file shares, OneDrive, SharePoint or file server locations to an explicit scanning scope.
Enterprise Security Intelligence
A practical workflow for discovering secrets across enterprise resources and turning findings into action.
Add selected repositories, file shares, OneDrive, SharePoint or file server locations to an explicit scanning scope.
Analyze supported file formats, archives and selected histories for credential patterns, entropy signals and contextual indicators.
Identify likely passwords, API keys, tokens, private keys, certificates, connection strings and service account credentials.
Attach source, path, file type, exposure indicators, confidence, duplicate signals and ownership hints to each finding.
Rank findings so teams can work on high-impact exposure first instead of processing a flat list of noisy alerts.
Help teams rotate, revoke, remove, suppress, export and document remediation activities.
Detection logic
Credential-like strings appear everywhere. Onyxaris is designed to combine pattern matching, entropy checks, file context, source metadata and confidence scoring to reduce noise and surface what matters.
| Signal | Example | Why it helps |
|---|---|---|
| Pattern | Known API key formats, private key blocks, connection string structures | Identifies common credential families |
| Entropy | Random-looking tokens and secrets | Finds values without obvious prefixes |
| Context | File path, extension, nearby words, environment hints | Distinguishes likely secrets from benign text |
| Exposure | Source system, access scope, sharing signals | Prioritizes findings with broader access |
| Recurrence | Same secret across multiple files or locations | Shows sprawl and copy paths |
Start focused
Start with a focused exposure assessment across your highest-risk sources: network shares, repositories, OneDrive or SharePoint.