Managing Findings
Findings are secrets or potential secrets detected by Azath. Each finding is classified by severity and tracked through its lifecycle.
Severity Levels
Active credentials with direct system access. AWS root keys, database URLs with passwords, payment keys. Rotate immediately.
Service credentials and API keys with significant access. OAuth tokens, service account keys, private keys.
Limited-scope credentials or potential secrets requiring investigation. Internal tokens, webhook secrets, configuration keys.
Low-risk patterns that may be false positives. Placeholder values, test credentials, public tokens.
Informational findings that may warrant review. High-entropy strings, suspicious variable names.
Finding Statuses
- ▸ Open — detected and not yet addressed
- ▸ Resolved — credential rotated or removed from codebase
- ▸ False Positive — confirmed not a real secret
- ▸ Ignored — acknowledged but deliberately not acted on
Remediating Findings
When you find a real secret:
- 1. Rotate the credential immediately in the provider dashboard
- 2. Remove it from your codebase and git history (
git filter-repoor BFG) - 3. Move the secret to a secrets manager or environment variables
- 4. Mark the finding as Resolved in the dashboard
◈ AI Verification
Findings with AI analysis include a confidence score (0–100). High-confidence findings are very likely real secrets. Low-confidence findings warrant manual review before marking as false positives.