Enterprise Security Intelligence
Coverage for the places where secrets actually spread.
Repository scanning is necessary, but it is not enough. Onyxaris is designed to cover the file stores and collaboration spaces that often hold forgotten credentials.
Source coverage
Each source gets its own context.
Network shares
Shared folders, legacy project directories, scripts, backups and operational notes.
Explore → EnterpriseFile servers
Long-lived directories, exports, configuration backups and administrative files.
Explore → EngineeringGit repositories
Hardcoded secrets in source files, config files, branches and selected history.
Explore → CollaborationOneDrive
Synced folders, shared documents, exported configs and personal working directories.
Explore → CollaborationSharePoint
Project libraries, handover documents, runbooks and shared technical documentation.
Explore → Hidden riskArchives & backups
ZIP, 7z, tar, backups and packages that hide secrets from manual review.
Explore →Coverage matrix
Detection should adapt to storage reality.
Files are not equal. A credential inside a production runbook in a broadly shared library should be treated differently from a low-confidence string in an old test note.
| Source | Typical risky files | Useful context |
|---|---|---|
| Network shares | Scripts, .env, .ini, exports, archives | Path, owner hints, folder permissions |
| Repositories | Source code, CI/CD configs, history | Branch, commit, repository owner |
| OneDrive | Synced configs, notes, spreadsheets | Owner, sharing state, folder path |
| SharePoint | Runbooks, project docs, attachments | Site, library, access scope |
| Archives | Release packages, backups, exports | Archive path, nested file, recurrence |
Start focused
Ready to find where secrets are hiding?
Start with a focused exposure assessment across your highest-risk sources: network shares, repositories, OneDrive or SharePoint.