Skip to content

goAuD/Sentilook

Sentilook

Sentilook logo

Secret & Key Guardian for local-first secure development workflows.

Version Go Platform Offline First Masked Only Report Formats Audit JSONL License


Sentilook is an offline-first CLI scanner for local source and configuration directories. It detects likely secret exposure patterns and produces share-safe HTML, SARIF, and JSONL outputs.

Project owner and maintainer: Viktor Halupka (@goAuD).

Sentilook HTML report screenshot

Highlights

  • local-first runtime behavior
  • masked previews only
  • HTML and SARIF reporting
  • JSONL audit logging
  • Windows, Debian Bookworm, and Fedora workflows
  • container-friendly bind-mount testing

Quick Start

From the repository root:

go -C .\app test ./...
.\sentilook.ps1 version
.\sentilook.ps1 scan .\demo\demo-secrets --config .\app\configs\default.yaml
go -C ./app test ./...
./sentilook.sh version
./sentilook.sh scan ./demo/demo-secrets --config ./app/configs/default.yaml

The wrapper scripts keep repo-root paths working even though the Go module lives under app/.

Container smoke example:

docker run --rm -v "$PWD:/workspace" -w /workspace/app golang:1.24-bookworm \
  bash -c 'go test ./... && go run ./cmd/sentilook scan ../demo/demo-secrets --config ./configs/strict.yaml --out ./reports || [ "$?" -eq 1 ]'

Security Invariant

Sentilook is built around one hard rule:

  • raw secret values are never printed to console, report, or audit log
  • previews are always masked

Documentation

Community

Non-Goals

  • Not a cloud SIEM/SOC platform
  • Not a secrets vault replacement
  • Not a runtime EDR or full DLP product

About

Offline-first secret and key scanner for local development workflows with share-safe HTML, SARIF, and JSONL outputs.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors