βββ ββββββββββ ββββββ ββββββββββββ βββ βββββββ βββββββ ββββββββ
βββ βββββββββββββββββββββββββββββββ ββββββββββββββββββββββββββββ
βββ ββ βββββββββββββββββββ βββ βββββββββββ βββββββββββββββββββ
ββββββββββββββββββββββββββ βββ βββββββββββ ββββββββββ ββββββββ
βββββββββββββ ββββββ βββ βββ βββ βββββββββββββββ ββββββββ
ββββββββ βββ ββββββ βββ βββ βββ βββ βββββββ βββ ββββββββ
Stop secrets before they stop you. WrathOps doesn't just detect β it understands, explains, and protects.
Most security tools scream at you with a vague Secret detected and leave you stranded. WrathOps is built differently.
Traditional Tools β "Secret detected. Good luck."
WrathOps β "Here's what it is, how dangerous it is,
whether it's active, and exactly how to fix it."
| Question | WrathOps Answers It |
|---|---|
| π― What is it? | Identifies the exact provider and secret type |
| Classifies risk from 0β100 with confidence scoring | |
| π₯ Why does it matter? | Explains real-world impact in plain language |
| π Is it even active? | Validates key status without external exposure |
| π§ How do I fix it? | Guides you toward safe, immediate remediation |
Beyond regex. WrathOps reads the room.
- Distinguishes test keys from production keys
- Understands intent based on file type and usage context
- Adapts detection logic per developer environment
Every finding gets an intelligent verdict:
βββββββββββββββββββββββββββββββββββββββββββββββ
β Classifications β
β β
β π’ fake_or_test β Safe to ignore β
β π‘ expired_or_invalid β Low priority β
β π΄ real_and_dangerous β Act immediately β
β β
β + Risk Score (0 β 100) β
β + Confidence Score β
βββββββββββββββββββββββββββββββββββββββββββββββ
No jargon. No vague warnings. Just clarity:
π¬ "This appears to be a production AWS key. If exposed, attackers
could access your cloud infrastructure and incur billing charges."
Key status β determined without sending your secrets anywhere:
- β Likely Active β Matches known production patterns
β οΈ Likely Inactive β Test/example pattern detected- β Unknown β Valid format, status unverified
Tired of your example docs getting flagged?
- Detects known dummy/test key patterns automatically
- Filters noise so you focus on real threats only
Write code β Stage changes β WrathOps checks β β
Clean commit OR β Blocked
- Runs entirely locally β fast and lightweight
- Stops secrets at the source, before they ever touch a remote
ββββββββββββββββ ββββββββββββββββββββ ββββββββββββββββββββ ββββββββββββββββββββ
β β β β β β β β
β DETECTION ββββββΆβ CLASSIFICATION ββββββΆβ EXPLANATION ββββββΆβ VALIDATION β
β β β β β β β β
β Scans your β β AI determines β β Human-readable β β Safely checks β
β codebase β β severity & β β risk summary β β key format & β
β for secrets β β category β β is generated β β status β
β β β β β β β β
ββββββββββββββββ ββββββββββββββββββββ ββββββββββββββββββββ ββββββββββββββββββββ
pip install git+https://github.com/tulu-g559/WrathOps-cli.git
wrathops installwrathops scan ./my_projectAdd to your .pre-commit-config.yaml:
repos:
- repo: https://github.com/your-org/wrathops
rev: v1.0.0
hooks:
- id: wrathopsThen install the hook:
pre-commit installπ¨ Secrets Detected in ./app.py
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β AWS_SECRET_KEY
Risk: 100/100 β Class: real_and_dangerous β Confidence: 0.99
ββββββββββββββββββββββββββββββββββββββββββββββββββββββ
This appears to be a production AWS secret key. If exposed,
attackers could access your cloud resources and incur costs.
Status: β Unknown (valid format, not externally verified)
β GOOGLE_API_KEY
Risk: 82/100 β Class: real_and_dangerous β Confidence: 0.82
ββββββββββββββββββββββββββββββββββββββββββββββββββββββ
This appears to be a Google API key. It could allow access to
your services and lead to data exposure or abuse.
Status: β οΈ Likely Inactive (test/example pattern detected)
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Commit blocked: 2 secret(s) detected. Remediate before committing.
WrathOps is designed with absolute privacy at its core.
β
No secrets stored β ever.
β
No external API calls β your keys never leave your machine.
β
Fully local execution β runs entirely on your system.
β
Masked outputs & logs β sensitive values are never printed raw.
Your code is your business. WrathOps keeps it that way.
| Audience | Use Case |
|---|---|
| π¨βπ» Jr. Software Engineers | Lightweight, noise-free pre-commit security hook |
| π Students & Learners | Learn security best practices and env variable hygiene |
| π Engineering Managers | Improve team-wide security culture and code hygiene |
- Before pushing any code to GitHub / GitLab
- To secure hackathon, student, or beginner projects
- As a final safety net in any development workflow
The vision for WrathOps is to become a complete Developer Security Assistant.
- Automated Fix Generation β Move hardcoded secrets to
.envand replace withos.getenv()automatically - GitHub PR Remediation β Automated PR comments explaining risks, natively in GitHub
- CI/CD Integration β Native GitHub Actions and GitLab CI plugins
- Provider-Level Safe Validation β Secure, non-intrusive validation against AWS, OpenAI, and more
- Org-Level Analytics β Dashboards to monitor security hygiene trends across teams