logo
Swift Scanner Kingfisher Exposes Active Code Secrets

Swift Scanner Kingfisher Exposes Active Code Secrets

Arabian Post23-06-2025
A high‑performance tool named Kingfisher, developed by MongoDB, now enables developers and security teams to detect and validate active secrets—such as API keys and credentials—in codebases in real time. Its release addresses shortcomings in existing scanners by verifying through live checks against cloud services.
Kingfisher began as a personal project in July 2024 by MongoDB security engineer Mick Grove, who was dissatisfied with current open‑source secret scanners. Internal testing confirmed that by April 2025 it had become a core part of MongoDB's internal security workflows—scanning pre‑commit code, CI/CD pipelines, Git histories and on‑premise files to identify active secrets. The tool has now been made publicly available under the Apache 2.0 licence.
Introducing Kingfisher: The Open Source Secret Scanner that Finds and Validates Leaked Secrets Fast
ADVERTISEMENT
Crafted in Rust, Kingfisher employs Intel's Hyperscan for high‑speed regex matching and Tree‑sitter for language‑aware source parsing across more than 20 languages. It runs multi‑threaded scans on repositories and file systems and adds entropy‑based rules to filter high‑confidence detections. The standout feature is active validation: when a potential secret is found, the tool attempts to authenticate against external APIs—such as AWS, Azure, GCP or Stripe—to determine if it remains functional.
This real‑time validation sharply reduces false positives. For example, Kingfisher identified one active AWS secret and four inactive Slack tokens in illustrative internal tests. The tool ships with over 700 built‑in detection rules and supports custom configurations via YAML, making it extensible to new credential types.
Performance benchmarking shows Kingfisher outpaces popular tools such as TruffleHog and Gitleaks in terms of runtime, offering a faster, more efficient scanning solution. Its cloud‑agnostic validation ensures organisations obtain unified visibility over secrets, irrespective of the cloud provider in use.
Using Kingfisher aligns with compliance demands, particularly those of the Supply‑chain Levels for Software Artifacts. It aids organisations working toward SLSA Level 2 and beyond by preventing embedded credentials in source code and safeguarding build integrity during the software supply chain lifecycle.
Unlike cloud‑hosted secret scanning, Kingfisher operates entirely on‑premise or within authorised infrastructure. This ensures that detected secrets do not leave the user's environment, addressing data privacy and sovereignty concerns.
Kingfisher is accessible across major operating systems, including Linux, macOS and Windows. Installation options range from pre‑built binaries to source compilation via Docker. It also integrates seamlessly with GitHub, GitLab, and CI/CD systems, enabling detection at pre‑commit, pull‑request and post‑merge stages.
Given the surge in credential‑related breaches and the market's growing concern over hidden, hard‑coded secrets, Kingfisher directly responds to a critical need. Credential exposure remains a leading cause of data breaches, with stolen secrets frequently exploited by automated botnets and sold on underground markets.
By combining live validation, speed, and extensibility, Kingfisher represents a meaningful shift in the secret‑scanning ecosystem. It not only identifies potential security issues, but confirms those that pose genuine risk—allowing developers and security engineers to focus remediation efforts on threats that truly matter.
Its release as open‑source ensures broader access: security teams, DevOps practitioners and smaller organisations can now employ an enterprise‑grade scanner without incurring licensing fees or relying on proprietary systems. MongoDB's publication of Kingfisher thus reinforces its commitment to open‑source solutions that empower the wider tech community.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

AWS rolls out 3 key security capabilities at re:Inforce
AWS rolls out 3 key security capabilities at re:Inforce

Zawya

time2 hours ago

  • Zawya

AWS rolls out 3 key security capabilities at re:Inforce

New tools will allow customers to better protect their digital assets, identify important security issues, defend against cyberattacks, and more. AWS is introducing three new enhanced security services to help organizations better manage emerging threats in the gen AI era. AWS Security Hub helps teams identify and address critical issues in one unified location. AWS Shield's new proactive network security analysis makes it easier to spot and fix security gaps before attackers can exploit them. Amazon GuardDuty enhances its Extended Threat Detection to container-based environments, identifying complex attack patterns that might otherwise go undetected. United Arab Emirates, Dubai – Amazon Web Services (AWS) unveiled a suite of new security capabilities at AWS re:Inforce, to help customers of all sizes strengthen their digital defenses. AWS re:Inforce, the company's annual cloud security conference, brings together security experts, partners, and builders from around the world to collaborate on addressing emerging security challenges in the generative AI era. As organizations face increasingly sophisticated cyber threats, AWS announced a dozen new capabilities today aiming to simplify security management while providing even more comprehensive protection. Here are three of those key services: AWS Security Hub: helping customers quickly spot and prioritize active threats to their systems AWS Security Hub helps customers identify their most critical security issues and respond quickly to reduce risks. It acts as a kind of 'security command center,' connecting the dots between different types of security alerts and vulnerabilities. This helps security teams quickly spot and prioritize active threats to their cloud systems. By bringing everything together into one place, Security Hub provides a clearer picture of an organization's security status while eliminating the need to manually gather information from multiple security tools. AWS Security Hub is available in preview to AWS customers starting today. AWS Shield: proactively protecting customers' online systems AWS Shield is enhancing how it protects websites and online applications by proactively finding network security configuration mistakes and weaknesses. The service now creates a map of customers' security resources, identifying vulnerabilities to common attacks like SQL injections (when hackers try to access data through website forms) and Distributed Denial-of-Service, or DDoS, attacks (when attackers overwhelm websites with fake traffic to make them crash). AWS Shield provides an easy-to-understand dashboard that highlights issues by severity, along with step-by-step instructions for fixing problems quickly. Customers can even use Amazon Q, the most capable generative AI-powered assistant for work, to get guidance through simple conversations, rather than navigating complex security settings. Amazon GuardDuty: launching Extended Threat Detection for container-based applications AWS announced expanded capabilities for Amazon GuardDuty Extended Threat Detection (XTD), which now protects container-based applications running on Amazon Elastic Kubernetes Service (EKS). GuardDuty connects various security signals across customers' systems to detect sophisticated attack patterns that might otherwise go unnoticed. By monitoring EKS audit logs, runtime behavior, and AWS activity, GuardDuty can identify complex, multi-stage attacks. These improved detection capabilities allow security teams to spend less time investigating potential issues and more time addressing genuine threats, reducing the impact on business operations. Balancing AI innovation with safety concerns is within reach, but it requires unprecedented collaboration between governments and companies. As security challenges continue to evolve, AWS is committed to ensuring organizations stay ahead of potential risks. For example, AWS now has 100% multi-factor authentication enforcement for all root users across all types of AWS accounts. The new security capabilities announced today provide customers with deeper visibility, streamline security operations, and help protect their cloud environments more effectively. By building security capabilities that empower innovation and creating guardrails that give organizations the confidence to scale rapidly, AWS is helping customers build stronger security postures with less effort, allowing them to focus more resources on growth. Learn more about these security topics and what's being discussed at AWS re:Inforce. About Amazon Web Services Since 2006, Amazon Web Services has been the world's most comprehensive and broadly adopted cloud. AWS has been continually expanding its services to support virtually any workload, and it now has more than 240 fully featured services for compute, storage, databases, networking, analytics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, media, and application development, deployment, and management from 114 Availability Zones within 36 geographic regions, with announced plans for 16 more Availability Zones and five more AWS Regions in Chile, New Zealand, the Kingdom of Saudi Arabia, Taiwan, and the AWS European Sovereign Cloud. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—trust AWS to power their infrastructure, become more agile, and lower costs. To learn more about AWS, visit About Amazon Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. Amazon strives to be Earth's Most Customer-Centric Company, Earth's Best Employer, and Earth's Safest Place to Work. Customer reviews, 1-Click shopping, personalized recommendations, Prime, Fulfillment by Amazon, AWS, Kindle Direct Publishing, Kindle, Career Choice, Fire tablets, Fire TV, Amazon Echo, Alexa, Just Walk Out technology, Amazon Studios, and The Climate Pledge are some of the things pioneered by Amazon.

Cursor extends AI‑coding agents to the browser
Cursor extends AI‑coding agents to the browser

Arabian Post

timea day ago

  • Arabian Post

Cursor extends AI‑coding agents to the browser

Cursor's developer, Anysphere, today launched a browser‑based web app that enables users to manage a coordinated network of AI coding agents directly from desktop or mobile. The app allows developers to submit natural‑language tasks—such as building features or fixing bugs—to agents working autonomously in the background. Users can monitor progress, view agent‑generated code diffs, and merge changes into repositories—all without returning to the IDE. The web interface builds on earlier enhancements. In May, Cursor introduced 'background agents' capable of executing end‑to‑end code tasks with minimal supervision. A Slack integration followed in June, enabling teams to initiate tasks by mentioning '@Cursor' within chat threads. Anysphere's decision to expand beyond its IDE reflects strong demand, according to Andrew Milich, head of product engineering: 'remove the friction' for users who wish to invoke Cursor in more contexts. With the new web app, agents are accessible via any device with a browser, including via a progressive web app installable on mobile platforms. ADVERTISEMENT Behind the scenes, each background agent runs in its secure isolated environment—cloning repositories, working on branches, and pushing changes when tasks complete. Agents generate their own pull requests, and teams with Git repository access can review diffs via the web interface. Users may spawn multiple agents simultaneously, allowing parallel experimentation with different AI models from providers including OpenAI, Anthropic and Google. Slack integration deepens collaboration: agents can be triggered by tagging @Cursor within conversations. They parse context—such as bug reports or stack traces—and return code proposals through GitHub pull requests, notifying the matching Slack channel when work finishes. This feature enables non‑technical stakeholders to engage with codeflows directly through chat. Anysphere confirmed that all paying users with access to background agents can use the new web app. It is available to subscribers on the $20 per month Pro plan and above, but not to users on the free tier. Business metrics underpin the move. Cursor surpassed $500 million in annualised recurring revenue last month, driven by monthly subscriptions. Anysphere says the platform is now used by more than half of Fortune 500 companies, including Nvidia, Uber and Adobe. To support enterprise needs, the company recently rolled out an enhanced tier priced at $200 per month. This tier offers significantly increased usage of AI models from multiple providers and advance access to features. Earlier this year, Anysphere closed a $900 million funding round at a $9.9 billion valuation—its third in under a year—and became one of the fastest software startups to hit $500 million ARR. Anysphere designed Cursor's agent rollout deliberately, avoiding premature 'demo‑ware' and intending agents to reliably deliver production‑grade code. CEO Michael Truell forecasts that by 2026 agents will handle at least 20 per cent of a software engineer's tasks. Industry analysts note that early adopters have embraced Cursor for its mature tooling and integrations. The IDE—based on Visual Studio Code—offers familiar features with added AI capabilities like smart rewrites, codebase querying and autocomplete. Among its peers, Cursor leads in reliability, with users citing its code quality and contextual awareness as competitive strengths. However, experts caution that expanded agent use may introduce new complexities. Discussions in developer forums highlight potential pitfalls of 'vibe coding'—using AI prompts in isolation—such as drifting from coherent architecture and leaking sensitive data like API keys. Even experienced users emphasise that success requires structured oversight and thoughtful documentation.

Redington Celebrates 25 Years Of Democratizing Technology In MEA
Redington Celebrates 25 Years Of Democratizing Technology In MEA

Channel Post MEA

time2 days ago

  • Channel Post MEA

Redington Celebrates 25 Years Of Democratizing Technology In MEA

Redington celebrated 25 years of democratizing technology across Middle East and Africa at Redington ReInspire 2025, held at La Perle, Dubai. Opening the day, Redington's Managing Director and Group CEO, V.S. Hariharan, reflected on the company's evolution to a purpose-led digital platform. Hariharan said, 'We didn't start as a tech giant, but today we stand as the leading tech distributor in MEA, trusted by a large network of global brands and channel partners. What sets us apart is not just scale, but the strength of our ecosystem – channel partners, vendors and customers – working in gravitational harmony. That's how we've grown, and that's how we'll continue to democratize technology for decades to come.' The La Perle, Dubai theatre was packed with over 700 attendees – channel partners, technology vendors, and longtime collaborators – each of whom has played a role in Redington's remarkable growth story. The event's sponsors featured Microsoft, Fortinet, AWS, HPE, Aruba, Intel, Qlik, Nutanix and Confluent. Narayanan KV, Head of Omni Channel for the Middle East, Saudi Arabia, and Africa at HP Inc., delivered a heartfelt tribute to HP's 25-year partnership with Redington during his keynote address, highlighting the strength, trust, and shared success that have defined the journey. The packed agenda also featured keynote addresses from Rachel Lashford, Vice President, Marketing at Canalys; Adi Morun, Director – Data & AI Business, CEMA, Microsoft and Shadi Shidvash, EMEA Distribution Sales Director at Intel. Lashford shared compelling insights with channel partners in the room on emerging opportunities in AI, Cloud, SaaS and beyond in her keynote session, highlighting how partners can stay ahead in a rapidly evolving digital landscape. Morun delivered thought-provoking takeaways on 'Innovation in the Era of AI', offering a clear vision of how data and AI are reshaping industries and unlocking new possibilities for partners. Shidvash presented an engaging keynote titled 'Intel Inside, Great Partnerships Outside', emphasizing the power of collaboration in driving innovation, performance, and ecosystem-wide impact. Three power-packed panel discussions set the tone for forward-looking conversations during Redington ReInspire. There was a panel that brought Redington's new leadership team on stage for a deep dive into the company's strategy, culture, and next phase of growth. Moderated by the CEO of Redington MEA Viswanath Pallasena, the Redington panellists included Ramesh Natarajan, Chief Executive Officer, IME; Sayantan Dev, Global Head – Software Solutions Group; Serkan Celik, Chief Executive Officer, (Turkey, Africa, Egypt, CIS Region) and Serkan Kutlu, Global Chief Strategy Officer. Pallasena said, 'Over the last 25 years, Redington has made a real mark on the market. However, we're not standing still – we're evolving with it. As the needs of our partners and customers change, we're gearing up for what's next, embracing a digital-first mindset, and staying aligned with where the industry is headed.' Natarajan said, 'What we've built over time is powerful, but what we're building next is transformative. Together with our partners, we're reimagining and reinspiring the business of technology to be faster, more open, and deeply human.' The next panel, 'Building Intelligent Ecosystems in a Software-Defined Era', moderated by Sayantan Dev, explored how technology providers and partners can enable smarter, more adaptable businesses. The panellists included Andy Parkinson, Senior Director, Distribution Head EMEA / Channel Sales Leader META & CIS, Qlik; Vinod Krishnan, Head, Partner Management, META, AWS; Shane Grennan, Senior Director of Partner Sales and Business Development, MET, Fortinet; and Raif Abou Diab, Country Manager – UAE, Oman, Pakistan, Yemen & Sub-Saharan Africa at Nutanix Dev said, 'Redington has been committed to building intelligent ecosystems by bridging global innovation with regional opportunity. Redington ReInspire's venue, La Perle, Dubai, much like our vision, blends creativity with impact—an ideal setting to discuss what it means to thrive in a software-defined era. We are no longer talking about individual solutions. We're building interconnected ecosystems, where software, infrastructure, and services converge to deliver lasting value.' In another panel, Powering Technology That Matters, Redington invited leaders from Microsoft, HPE, Intel, and HPE Aruba to examine how AI, infrastructure, and connectivity can align with purpose and performance. This panel, presented in partnership with Intel, included Shadi Shidvash, EMEA Distribution Sales Director at Intel; Syed Mansoor Hussain, Device Partner Sales Lead UAE, Microsoft; Michael Langeveld, Head of Technology & Business Development (Emirates & Africa), HPE; and Ahmed AlSayed, Regional Channel Sales Manager, MEA, HPE Aruba. The event honored over 60 long-standing vendors and channel partners with Legacy Loyalty Awards, recognizing those who have stood with Redington through every transformation

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store