The API key baked
into your container.
Secrets accidentally embedded in container images are one of the most common โ and most avoidable โ sources of credential exposure. Tacosec scans every layer of every image as part of your normal CVE workflow. No separate tool. No extra step.
How It Happens
Secrets end up in images more often than you think.
How it happens
Dev hard-codes DB password in Dockerfile
The result
Secret baked into every image layer ever built from it
How it happens
AWS key committed to .env, copied into build context
The result
Key live in container registry, accessible to anyone with pull access
How it happens
CI script echoes API token into image filesystem
The result
Credential extractable via docker inspect or layer extraction
Tacosec catches every one of these before the image leaves your build system.
Detection in Action
Found. Before it shipped.
โถ Scanning 6 layers for secrets and credentials...
โ SECRET FOUND AWS Access Key ID
Layer: sha256:a3f91c (stage: builder)
File: /app/.env.production
Match: AKIA[A-Z0-9]{16} โ verified AWS key pattern
โ SECRET FOUND GitHub Personal Access Token
Layer: sha256:b7d204 (stage: final)
File: /root/.gitconfig
Match: ghp_[A-Za-z0-9]{36} โ verified GitHub token
โ Build blocked โ 2 secrets detected ยท rotate credentials immediately
How It Works
Every layer. Every secret type.
Layer-by-layer image scanning
Secrets can hide in any layer โ the base image, an intermediate build stage, or the final layer. Tacosec scans every layer and pinpoints exactly which one contains the exposure.
100+ secret pattern detectors
From AWS access keys and GitHub tokens to generic high-entropy strings, Tacosec matches known secret formats and flags them before they ship.
Caught in CI โ before the registry
Secret detection runs as part of the same pipeline scan as CVE checking. A secret found in your PR never makes it to your container registry.
Verified vs. unverified findings
Not every high-entropy string is a real secret. Tacosec verifies patterns against known formats and reduces noise โ so your team investigates real exposures, not false alarms.
Detected Secret Types
We know what to look for.
Included in CVE & SBOM
No extra setup. Already scanning.
Stop shipping credentials in your images.
Secret detection is included with every Tacosec CVE scan โ no separate configuration needed.
Run a Scan