1. Secret Scanning
Scan code for leaked secrets, credentials, and API keys.
2. Incident Management
View security incidents related to the project you are currently working.
3. Honeytokens
Create honeytokens to detect unauthorized access.
4. Authentication Management
Get authenticated user information and token details.
5. Token Management
Revoke current API tokens.