- Pre-receive hook on GitHub Enterprise Server v3.9 to v3.13 is no longer supported. v3.13 is EOL since 2025-06-19 and previous versions were discontinued earlier.
-
Add
@filesupport tosecret scan pathto load scan paths from a file. -
Add
ggshield secret scan ai-hookcommand to scan AI coding tool hook payloads for secrets in real time. -
Add new types
claude-code|cursor|copilotto theggshield installcommand to install hooks into AI coding tool configurations. -
Pre-receive hook can now be set up on GitHub Enterprise Server from v3.14 to higher.
-
api-status: display the scopes of the current authentication token.
-
secret scan ci: fetch the target branch before computing the MR/PR commit range. In CI environments with cached repos or shallow clones, a stale target branch ref could cause ggshield to scan unrelated commits, leading to excessive API calls and secrets reported in files not modified by the MR. -
hmsl vault-scan: fixed a hang when the HashiCorp Vault server is unresponsive; requests now time out after 30 seconds and network errors are reported with a clear message. -
Fixed a path traversal security issue in tar archives used for git-based scans; member names with absolute paths or
..components are now sanitized. -
Fixed an issue where an invalid option for a
secret scansubcommand could be silently treated as a request to run the default command, producing a confusing error instead of the expected usage error.
-
Add enterprise plugin system for ggshield, allowing organizations to install and manage plugins from GitGuardian.
-
hmsl: Secrets shorter than 6 characters are now filtered out before being sent to the HMSL API, reducing false positives from obvious non-secrets.
-
hmsl: Expand the list of excluded placeholder values (e.g.,changeme,placeholder,redacted) that are not sent to the HMSL API. -
Relax
urllib3dependency pin from~=2.2.2to>=2.2.2,<3, allowing compatibility with newer urllib3 versions (#1160).
- Prevent docker scan stdout from leaking into JSON output.
- Display a warning if .cache_ggshield is not ignored in a git repository.
-
A HTTPAdapter with wider parameters has been setup to better address scanning multiple files at the same time.
-
Add
GITGUARDIAN_GIT_REMOTE_FALLBACK_URLenvironment variable that allows setting a fallback value for the repository remote. -
Tokens are obfuscated in
ggshield config listoutput.
- Clearer error message when token is missing: specify the command to run to generate a token (ggshield auth login).
- Install
ggshieldhooks inside.husky/when the repository uses Husky-managed hooks so local installs work out of the box. (#1143).
-
ggshield no longer crashes when scanning invalid symlinks, it emits a warning instead.
-
Handle unmerged files in pre-commit scanning during an ongoing merge.
-
Fixed crash when ggshield received missing tags.
- Fixed Python version for PDM install in the build release workflow.
- Added
--insecureCLI option andinsecureconfiguration setting as clearer alternatives to--allow-self-signedandallow_self_signed. The new option explicitly communicates that SSL verification is completely disabled, making the connection vulnerable to man-in-the-middle attacks. - Added prominent warning messages when SSL verification is disabled (via either
--insecureor--allow-self-signed), explaining the security risks and recommending the secure alternative of using the system certificate trust store (available with Python >= 3.10).
- Removed Clear Linux from the OS package testing workflow as the project has been discontinued.
- The
--allow-self-signedCLI option andallow_self_signedconfiguration setting are now deprecated in favor of--insecureandinsecure. Deprecation warnings are displayed when these options are used, guiding users to the clearer alternative. Both options remain functional for backward compatibility and will be maintained for an extended deprecation period before removal.
-
Fixed crash when API returns scopes not yet recognized by py-gitguardian.
-
Skip non-seekable files instead of crashing.
- Improved clarity around SSL verification settings. The
--allow-self-signedoption name was misleading as it suggests certificate validation is still performed, when in reality all SSL verification is disabled. The new--insecureoption makes this behavior explicit. Both options remain functional for backward compatibility.
-
Fixed PyInstaller deprecation warning when running PyInstaller-based ggshield.
-
Scanning git repositories can no longer fail with git "dubious ownership" errors.
-
Extended the range of API error status codes supported by ggshield so the UI correctly displays them.
-
Added an additional section in
ggshieldoutputs to return vault related fields if the account setting is enabled. -
ggshieldDocker image now supports both linux/amd64 and linux/arm64 architectures (#952). -
ggshield secret scan dockernow scans more files.
ggshield secret scannow provides an--source-uuidoption. When this option is set, it will create the incidents on the GIM dashboard on the corresponding source. Note that the token should have the scopescan:create-incidents.
- When scanning a docker image, if no image is found matching the client platform, try to pull the
linux/amd64image.
-
The release assets now contain a NuGet package.
-
Added a new section in
ggshieldoutputs (text and JSON) to notify if a secret is in one of the accounts' secrets managers.
ggshield secret scan dockernow scans files in/usr/src/app.
-
Fixed a bug in the way
ggshieldobfuscated secrets that caused a crash for short secrets (#1086). -
ggshieldno longer crashes when it can't find git.
-
ggshieldis now available on Chocolatey (#934). -
ggshield secret scanoutput now contains a link to the detector documentation for each secret found.
- Fixed error when scanning
.tar.gzcompressed files inside docker layers.
- ggshield can now scan .jar files using
ggshield secret scan archive.
- Removed support for python 3.8.
- ggshield now uses the system certificates instead of the bundled ones. Note that this only works with Python >= 3.10 (#1067).
- Pre-receive hook isn't blocking anymore when GitGuardian server is temporarily unavailable (return 5xx status code).
-
Files with emojis in their name are now handled properly.
-
Fix ggshield crashing on Windows when doing big merges (#1032).
ggshield secret scan dockernow correctly handles ignored paths (#548).
ggshield scaandggshield iaccommands have been removed.
-
The
--instanceoption now accepts both https://api.eu1.gitguardian.com/v1 or https://api.gitguardian.com/v1. -
Fix
ggshield secret scan pre-commitcrashing on big merges (#1032).
ggshield secret scannow provides an--all-secretsoption. When this option is set, it lists all found secrets and their possible ignore reason.
-
Files contained in the
.git/directory are now scanned. Files in subdirectories such as.git/hooksare still excluded. -
When scanning commits, ggshield now ignores by default secrets that are removed or contextual to the patch.
-
Handle trailing content in multi-parent hunk header.
-
Installing ggshield from the release RPM on EL9 failed because of a missing library. This is now fixed (#1036).
-
Fix Visual Studio not being able to show error messages from ggshield pre-commit (#170).
-
ggshield config listcommand now supports the--jsonoption, allowing output in JSON format. -
All
secret scancommands as well as theapi-statusandquotacommands now supports the--instanceoption to allow using a different instance. -
The
api-statuscommand now prints where the API key and instance used come from.
-
ggshield api-status --jsonoutput now includes the instance URL. -
ggshield secret scan reponow usesgit clone --mirrorto retrieve more git objects. -
ggshield secret scan cinow scans all commits of a Pull Request in the following CI environments: Jenkins, Azure, Bitbucket and Drone.
- ggshield now prints a warning message when it is being run executed by Python 3.8.
-
When running
ggshield secret scan ciin a GitLab CI, new commits from the target branch that are not on the feature branch will no longer be scanned. -
Take into account the
--allow-self-signedoption at all levels inggshield secret scancommands. -
When
ggshield secret scanis called with--with-incident-detailsand the token does not have the required scopes, the command now fails and an error message is printed. -
ggshield no longer fails to report secrets for patches with content in hunk header lines.
-
The
--debugoption now automatically turns on verbose mode. -
The
--use-gitignoreoption now also applies to single files passed as argument. -
RPM packages now depend on
git-coreinstead ofgit, reducing the number of dependencies to install (#983).
-
When using the
--debugoption, the log output no longer overlaps with the progress bars. -
The ggshield pre-commit hook no longer crashes when merging files with spaces in their names (#991).
-
RPM packages now work correctly on RHEL 8.8 (#984).
- Fixed a regression introduced in ggshield 1.32.1, which made
ggshield install -m globalcrash (#972).
- Fixed a case where ggshield commit parser could fail because of the local git configuration.
-
When scanning a merge commit,
ggshield secret scan pre-commitnow skips files that merged without conflicts. This makes merging the default branch into a topic branch much faster. You can use the--scan-all-merge-filesoption to go back to the previous behavior. -
ggshield secret scancommands now provide the--with-incident-detailsoption to output more information about known incidents (JSON and SARIF outputs only). -
It is now possible to ignore a secret manually using
ggshield secret ignore SECRET_SHA --name NAME.
- The git commit parser has been reworked, fixing cases where commands scanning commits would fail.
- We now provide tar.gz archives for macOS, in addition to pkg files.
- JSON output: fixed incorrect values for line and index when scanning a file and not a patch.
- Fixed a bug where
ggshield secret scan archivecould be passed a maliciously crafted tar archive to overwrite user files.
-
ggshield secret scancommands can now output results in SARIF format, using the new--format sarifoption (#869). -
ggshield sca scan ciandggshield sca scan allnow support theMALICIOUSvalue for--minimum-severity
- ggshield now has the ability to display custom remediation messages on pre-commit, pre-push and pre-receive. These messages are defined in the platform and fetched from the
/metadataendpoint of the API. If no messages are set up on the platform, default remediation messages will be displayed as before.
Yanked: release process issue.
- The
--alloption of theggshield sca scan ciandggshield iac scan cicommands has been removed.
-
ggshield secret scan pathnow provides a--use-gitignoreoption to honor.gitignoreand related files (#801). -
A new secret scan command,
ggshield secret scan changes, has been added to scan changes between the current state of a repository checkout and its default branch. -
GGShield is now available as a standalone executable on Windows.
- The behavior of the
ggshield sca scan ciandggshield iac scan cicommands have changed. These commands are now expected to run in merge-request CI pipelines only, and will compute the diff exactly associated with the merge request.
- Running
ggshield sca scan ciorggshield iac scan cioutside of a merge request CI pipeline is now deprecated.
-
GGShield now consumes less memory when scanning large repositories.
-
Errors thrown during
ggshield auth loginflow with an invalid instance URL are handled and the stack trace is no longer displayed on the console. -
Patch symbols at the start of lines are now always displayed, even for single line secrets.
-
The
ggshield auth logincommand now respects the--allow-self-signedflag. -
GGShield now exits with a proper error message instead of crashing when it receives an HTTP response without
Content-Typeheader.
- The SCA config
ignored_vulnerabilitiesoption now supports taking a CVE ID as identifier.
- The
This feature is still in beta, its behavior may change in future versionswarning is no longer displayed for sca commands.
-
It is now possible to customize the remediation message printed by GGShield pre-receive hook. This can be done by setting the message in the
secret.prereceive_remediation_messageconfiguration key. Thanks a lot to @Renizmy for this feature. -
We now provide signed .pkg files for macOS.
-
Add a
This feature is still in beta, its behavior may change in future versionswarning toggshield iac scan allcommand.
- Linux .deb and .rpm packages now use the binaries produced by pyinstaller. They no longer depend on Python.
- Dash-separated configuration keys are now deprecated, they should be replaced with underscore-separated keys. For example
show-secretsshould becomeshow_secrets. GGShield still supports reading from dash-separate configuration keys, but it prints a warning when it finds one.
-
GGShield commands working with commits no longer fail when parsing a commit without any author.
-
Configuration keys defined in the global configuration file are no longer ignored if a local configuration file exists.
-
The option
--exclude PATTERNis no longer ignored by the commandggshield secret scan repo.
ggshield auth loginlearned to create tokens with extra scopes using the--scopesoption. Usingggshield auth login --scopes honeytokens:writewould create a token suitable for theggshield honeytokenscommands.
- It is now possible to create a honeytoken with context using the new
honeytoken create-with-contextcommand.
- SCA incidents ignored on the GitGuardian app will no longer show up in the scan results, in text/JSON format.
- Adds two new flags for
ggshield sca scancommands,--ignore-fixableand--ignore-not-fixableso that the user can filter the returned incidents depending on if incidents can be fixed or not. Both flags cannot be used simultaneously.
- Number of documents in a chunk is now adapted to the server payload.
- Moved some property from Scannable children classes up to Scannbable itself.
-
IAC/SCA scans will scan new commits as intended for CI jobs on newly pushed branches.
-
IAC/SCA scans will scan new commits as intended for CI jobs on the first push to a new repository
-
In CI jobs, IAC/SCA scans on forced pushs no longer trigger an error but perform a scan on all commits instead.
-
Fixes
ggshield sca scancommands not taking some user parameters into account.
-
GGShield output now adapts when the grace period of an IaC incident ignored by a developer has been expired.
-
GGShield now shows a warning message if it hits a rate-limit.
- IaC incidents ignored on the GitGuardian app no longer show up in the scan results.
-
IaC/SCA scans now properly find the parent commit SHA on GitLab push pipelines for new branches.
-
Error messages now appear above progress bars instead of overlapping them.
-
File content are now displayed as intended when executing
ggshield iac scan allon a subdirectory of a Git repository. -
Pre-push scans are now diff scans when pushing a new branch, comparing to the last commit of the parent branch.
-
Pre-push scans on empty repositories no longer include staged files.
-
Secret: GGShield now prints the name of what is being scanned when called with
--verbose(#212). -
You can now use the
SKIP=ggshieldenvironment variable without the pre-commit framework to skip pre-commit and pre-push scans.
- GGShield can now scan huge commits without running out of memory.
- IaC and SCA: scans in GitLab merge request pipelines should now be performed on the intended commit ranges, instead of an empty range.
- Support for new options in GitGuardian config file. IaC
ignored-pathsandignored_policiescan now be defined as objects withcommentanduntilproperties. If anuntildate is provided, the path/policy is only ignored up until this date. The old format is still supported. Check.gitguardian.example.yamlfor a sample.
-
ggshield iac scan diff --jsonoutput was changed.added_vulns,persisting_vulnsandremoved_vulnswere renamed asnew,unchangedanddeleted. They also were moved into aentities_with_incidentssimilarly to the scan all JSON output.Sample IaC diff JSON output
```json { "id": "fb0e9a92-de34-43f9-b779-17d25e99ab35", "iac_engine_version": "1.15.0", "type": "diff_scan", "entities_with_incidents": { "unchanged": [ { "filename": "s3.tf", "incidents": [ { "policy": "Allowing public exposure of a S3 bucket can lead to data leakage", "policy_id": "GG_IAC_0055", "line_end": 118, "line_start": 96, "description": "AWS S3 Block Public Access is a feature that allows setting up centralized controls\\nto manage public access to S3 resources.\\n\\nEnforcing the BlockPublicAcls, BlockPublicPolicy and IgnorePublicAcls rule on a bucket\\nallows to make sure that no ACL (Access control list) or policy giving public access\\ncan be associated with the bucket, and that existing ACL giving public access to\\nthe bucket will not be taken into account.", "documentation_url": "<https://docs.gitguardian.com/iac-scanning/policies/GG_IAC_0055>", "component": "aws_s3_bucket.operations", "severity": "HIGH" } ], "total_incidents": 1 } ], "deleted": [ { "filename": "s3.tf", "incidents": [ { "policy": "Allowing public exposure of a S3 bucket can lead to data leakage", "policy_id": "GG_IAC_0055", "line_end": 118, "line_start": 96, "description": "AWS S3 Block Public Access is a feature that allows setting up centralized controls\\nto manage public access to S3 resources.\\n\\nEnforcing the BlockPublicAcls, BlockPublicPolicy and IgnorePublicAcls rule on a bucket\\nallows to make sure that no ACL (Access control list) or policy giving public access\\ncan be associated with the bucket, and that existing ACL giving public access to\\nthe bucket will not be taken into account.", "documentation_url": "<https://docs.gitguardian.com/iac-scanning/policies/GG_IAC_0055>", "component": "aws_s3_bucket.operations", "severity": "HIGH", } ], "total_incidents": 1 } ], "new": [ { "filename": "s3.tf", "incidents": [ { "policy": "Allowing public exposure of a S3 bucket can lead to data leakage", "policy_id": "GG_IAC_0055", "line_end": 118, "line_start": 96, "description": "AWS S3 Block Public Access is a feature that allows setting up centralized controls\\nto manage public access to S3 resources.\\n\\nEnforcing the BlockPublicAcls, BlockPublicPolicy and IgnorePublicAcls rule on a bucket\\nallows to make sure that no ACL (Access control list) or policy giving public access\\ncan be associated with the bucket, and that existing ACL giving public access to\\nthe bucket will not be taken into account.", "documentation_url": "<https://docs.gitguardian.com/iac-scanning/policies/GG_IAC_0055>", "component": "aws_s3_bucket.operations", "severity": "HIGH" } ], "total_incidents": 1 } ] } } ```
- When a git command fails, its output is now always correctly logged.
-
Adapt message in case we find tons of matches
-
command
hmsl check-secret-manager hashicorp-vaultwith a "key" naming strategy will display the variable's full path instead of the variable name -
Support no location URL in HMSL response.
-
Change wording for HMSL output: do not mention occurrences as it can be misleading.
- Internal fixes to unblock release process
- ggshield now refuses to install on python < 3.8.
- Added new
ggshield hmsl check-secret-manager hashicorp-vaultcommand to scan secrets of an HashiCorp Vault instance.
- Help messages have been improved and are now kept in sync with ggshield online reference documentation.
-
Fixed a typo in the command suggested to tell git a directory is safe.
-
The bug on Gitlab CI for IaC and SCA, failing because git does not access the target branch in a merge request is fixed. Now fetches the target branch in the CI env before collecting commit shas.
-
Fix IaC and SCA scan commands in Windows
-
Fixed a bug which caused IaC and SCA scans to fail on GitLab CI because GitLab does not run
git fetchon the target branch for merge requests. ggshield now runsgit fetchitself to avoid this problem. -
Fixed a typo in the command suggested to tell git a directory is safe.
- ggshield gained a new group of commands:
hmsl, short for "Has My Secret Leaked". These commands make it possible to securely check if secrets have been leaked in a public repository.
-
ggshield iac scannow provides three new commands for use as Git hooks:ggshield iac scan pre-commitggshield iac scan pre-pushggshield iac scan pre-receive
They use the same arguments and options as the other
ggshield iac scancommands. -
The new
ggshield iac scan cicommand can be used to perform IaC scans in CI environments. It supports the same arguments as hook subcommands (in particular,--allto scan the whole repository). Supported CIs are:- Azure
- Bitbucket
- CircleCI
- Drone
- GitHub
- GitLab
- Jenkins
- Travis
- Introduces new commands to perform SCA scans with ggshield:
ggshield sca scan all <DIRECTORY>: scans a directory or a repository to find all existing SCA vulnerabilities.ggshield sca scan diff <DIRECTORY> --ref <GIT_REF>: runs differential scan compared to a given git ref.ggshield sca scan pre-commitggshield sca scan pre-pushggshield sca scan pre-receiveggshield sca scan ci: Evaluates if a CI event introduces new vulnerabilities, only available on Github and Gitlab for now.
- It is now possible to manipulate the default instance using
ggshield config:ggshield config set instance <THE_INSTANCE_URL>defines the default instance.ggshield config unset instanceremoves the previously defined instance.- The default instance can be printed with
ggshield config get instanceandggshield config list.
-
ggshield now requires Python 3.8.
-
The IaC Github Action now runs the new
ggshield iac scan cicommand. This means the action only fails if the changes introduce a new vulnerability. To fail if any vulnerability is detected, use theggshield iac scan ci --allcommand.
- The following options have been removed from
ggshield iac scan diff:--pre-commit,--pre-pushand--pre-receive. You can replace them with the newggshield iac scan pre-*commands.
-
ggshield secret scan dockernow runs as many scans in parallel as the other scan commands. -
ggshieldnow provides an easier-to-understand error message for "quota limit reached" errors (#309). -
ggshield iac scan diff--minimum-severityand--ignore-policyoptions are now correctly processed. -
ggshield secret scanno longer tries to scan files longer than the maximum document size (#561).
- ggshield now depends on cryptography 41.0.3, fixing https://github.com/advisories/GHSA-jm77-qphf-c4w8.
- Pin PyYAML>=6.0.1 to fix building (see yaml/pyyaml#702)
- Fixed ggshield not installing properly when installing with Brew on macOS.
-
New command:
ggshield iac scan all. This command replaces the now-deprecatedggshield iac scan. It scans a directory for IaC vulnerabilities. -
New command:
ggshield iac scan diff. This command scans a Git repository and inspects changes in IaC vulnerabilities between two points in the history.- All options from
ggshield iac scan allare supported:--ignore-policy,--minimum-severity,--ignore-pathetc. Executeggshield iac scan diff -hfor more details. - Two new options allow to choose which state to select for the difference:
--ref <GIT-REFERENCE>and--staged. - The command can be integrated in Git hooks using the
--pre-commit,--pre-push,--pre-receiveoptions. - The command output list vulnerabilities as
unchanged,newanddeleted.
- All options from
-
Added a
--log-file FILEoption to redirect all logging output to a file. The option can also be set using the$GITGUARDIAN_LOG_FILEenvironment variable.
-
Improved
secret scan pathspeed by updating charset-normalizer to 3.1. -
Errors are no longer reported twice: first using human-friendly message and then using log output. Log output is now off by default, unless
--debugor--log-fileis set (#213). -
The help messages for the
honeytokencommands have been updated. -
ggshield honeytoken createnow displays an easier-to-understand error message when the user does not have the necessary permissions to create an honeytoken. -
ggshield auth loginnow displays a warning message if the token expiration date has been adjusted to comply with the personal access token maximum lifetime setting of the user's workspace.
ggshield iac scanis now replaced by the newggshield iac scan all, which supports the same options and arguments.
- Add a new
ggshield honeytoken createcommand to let you create honeytokens if enabled in your workspace. Learn more about honeytokens at https://www.gitguardian.com/honeytoken
ggshield secret scancommands can now use server-side configuration for the maximum document size and maximum document count per scan.
-
Accurately enforce the timeout of the pre-receive secret scan command (#417)
-
Correctly compute the secret ignore sha in the json output.
-
GitLab WebUI Output Handler now behaves correctly when using the
ignore-known-secretsflag, it also no longer displays empty messages in the UI.
ggshield secret scanJSON output has been improved:- It now includes an
incident_urlkey for incidents. If a matching incident was found in the user's dashboard it contains the URL to the incident. Otherwise, it defaults to an empty string. - The
known_secretkey is now always present and defaults tofalseif the incident is unknown to the dashboard.
- It now includes an
- Fixed a regression introduced in 1.15.0 which caused the
--ignore-known-secretsoption to be ignored.
-
ggshield secret scanoutput now includes a link to the incident if the secret is already known on the user's GitGuardian dashboard. -
ggshield secret scan dockerno longer rescans known-clean layers, speeding up subsequent scans. This cache is tied to GitGuardian secrets engine version, so all layers are rescanned when a new version of the secrets engine is deployed.
- Fixed an issue where the progress bar for
ggshield secret scancommands would sometimes reach 100% too early and then stayed stuck until the end of the scan.
- The deprecated commands
ggshield scanandggshield ignorehave been removed. Useggshield secret scanandggshield secret ignoreinstead.
-
ggshield iac scancan now be called without arguments. In this case it scans the current directory. -
GGShield now displays an easier-to-understand error message when no API key has been set.
-
Fixed GGShield not correctly reporting misspelled configuration keys if the key name contained
-characters (#480). -
When called without an image tag,
ggshield secret scan dockernow automatically uses the:latesttag instead of scanning all versions of the image (#468). -
ggshield secret scannow properly stops with an error message when the GitGuardian API key is not set or invalid (#456).
-
GGShield Docker image can now be used to scan git repositories even if the repository is mounted outside of the /data directory.
-
GGShield commit hook now runs correctly when triggered from Visual Studio (#467).
-
ggshield secret scan pre-receiveno longer scans deleted commits when a branch is force-pushed (#437). -
If many GGShield users are behind the same IP address, the daily update check could cause GitHub to rate-limit the IP. If this happens, GGShield honors GitHub rate-limit headers and no longer checks for a new update until the rate-limit is lifted (#449).
-
GGShield once again prints a "No secrets have been found" message when a scan does not find any secret (#448).
-
Installing GGShield no longer creates a "tests" directory in "site-packages" (#383).
-
GGShield now shows a clear error message when it cannot use git in a repository because of dubious ownership issues.
- The deprecation message when using
ggshield scaninstead ofggshield secret scannow states theggshield scancommands are going to be removed in GGShield 1.15.0.
-
It is now possible to use generic command-line options like
--verboseanywhere on the command line and scan options anywhere after thescanword (#197). -
ggshield iac scannow shows the severity of the detected vulnerabilities.
-
If a file containing secrets has been committed in two different branches, then
ggshield secret scan repowould show 4 secrets instead of 2. This has been fixed (#428). -
ggshield now uses different error codes when a scan succeeds but finds problems and when a scan does not finish (#404).
-
ggshield now correctly handles the case where git is not installed (#329).
- Fixed dependency on pygitguardian, which blocked the release on pypi.
-
ggshield scan commands now accept the
--ignore-known-secretsoption. This option is useful when working on an existing code-base while secrets are being remediated. -
ggshield learned a new secret scan command:
docset. This command can scan any content as long as it has been converted into our new docset file format.
ggshield auth login --method=tokencan now read its token from the standard input.
-
ggshield now prints clearer error messages if the .gitguardian.yaml file is invalid (#377).
-
When used with the pre-commit framework, ggshield would sometimes scan commits with many files more than once. This has been fixed.
-
ggshield auth loginno longer fails when called with--lifetime. -
pre-receive and pre-push hooks now correctly handle the case where a branch with no new commits is pushed.
-
ggshield no longer fails when scanning paths longer than 256 characters (#391).
- Fix crash at startup if the home directory is not writable.
- ggshield now checks for update once a day and notifies the user if a new version is available. This check can be disabled with the
--no-check-for-updatescommand-line option (#299).
-
Scanning Git repositories is now faster.
-
ggshield secret scan pathnow shows a progress bar. -
When used as a pre-push or pre-receive hook, ggshield no longer scans more commits than necessary when a new branch is pushed (#303, #369).
-
ggshield no longer declares two separate instances if the instance URL is set with and without a trailing slash (#357).
-
Fixed a regression where ggshield would not load the .env from the current working directory.
-
ggshield no longer silently ignores network issues.