Veles – Google’s Open Source Secret Scanner for GCP Key Detection
Google发布轻量级开源模块Veles,用于检测GCP环境中的敏感凭证暴露。该模块集成于OSV-SCALIBR平台,可快速扫描Google Cloud API密钥、服务账户凭证及RubyGems密钥。其优势在于与Google生态系统深度整合,并支持DevSecOps流程。目前功能有限但预期将扩展更多支持。 2025-8-8 01:0:0 Author: www.darknet.org.uk(查看原文) 阅读量:0 收藏

Google has released Veles, a lightweight, open-source secret scanning module designed to catch sensitive credential exposure, particularly in GCP environments. It integrates directly with the OSV-SCALIBR (Software Composition Analysis and License-Based Risk) platform and currently targets Google Cloud API keys, service account credentials, and RubyGems keys.

Veles - Google's Open Source Secret Scanner for GCP Key Detection

Veles stands out not because it’s another scanner, but because it’s purpose-built to support structured ecosystem integration inside Google’s dependency and package scanning pipelines. That makes it an efficient drop-in for any DevSecOps pipeline already using OSV-SCALIBR or deps.dev.

Key Features

  • Detects Google API keys, service account keys, and RubyGems tokens
  • Fast scanning with low system overhead
  • Fully open source with permissive licensing
  • Integrates with Google Cloud tooling like deps.dev and CI/CD pipelines

Installation & Usage

Veles is currently embedded as a module in the OSV-SCALIBR ecosystem. To use it, you need to clone the repo and enable the scanner in your pipeline or project analysis:

git clone https://github.com/google/osv-scalibr.git

cd osv-scalibr

# Run Veles scan

python3 -m osv_scalibr.scan --secrets your_project_path/

The expected output includes flagged credentials with their associated context, filename, and token type.

Why It Matters

Most dev teams already rely on secret scanning tools like Gitleaks or detect-secrets. What sets Veles apart is its tight alignment with Google’s internal tools and the GCP ecosystem. It complements Google’s larger efforts around software supply chain security by making it easier to catch credential leaks earlier in the build process, before they reach production or source control.

It’s also a good example of security tooling built specifically with ecosystem context in mind, instead of relying on bloated, general-purpose regex bundles that produce false positives.

Red Team & Blue Team Relevance

From a red team perspective, tools like Veles signal how mature defenders are integrating automated credential scanning at the infrastructure level — meaning attackers are less likely to get away with plaintext secrets in open repos.

For blue teams and developers, Veles is another piece in the shift-left pipeline, moving security earlier in the development cycle and avoiding GCP credential exposure that can result in complete compromise or massive cloud bills from misused services.

Limitations

  • Currently limited to GCP and RubyGems secrets.
  • No support (yet) for broader cloud providers or generic secrets like JWTs or SSH keys.
  • No default runtime watchdog or Git hooks (yet).

That said, it’s early days — and Veles appears to be gaining internal adoption at Google, so we expect wider support to follow soon.

You can read more or enable Veles via OSV-SCALIBR here: https://github.com/google/osv-scalibr

Reader Interactions


文章来源: https://www.darknet.org.uk/2025/08/veles-googles-open-source-secret-scanner-for-gcp-key-detection/
如有侵权请联系:admin#unsafe.sh