Scan your AI history for leaked secrets

One command. 15 seconds. Checks Claude, Cursor, Copilot, ChatGPT, and 35+ more AI tools for AWS keys, database passwords, API tokens, and private keys.

Then run citrusglaze-scan. Requires Python 3.8+. View source on GitHub

Terminal
$ pip install citrusglaze-scan && citrusglaze-scan
Scanning ~/.claude/projects/ ...
Scanning ~/.cursor/logs/ ...
Scanning ~/.copilot/ ...
πŸ” SCAN COMPLETE
Prompts scanned: 4,847
AI tools found: 7 (Claude, Cursor, Copilot, ChatGPT, Gemini, pip, npm)
⚠ 169 secrets found
65 CRITICAL β€” AWS keys, private keys, DB passwords
103 HIGH      β€” API tokens, webhook URLs, auth tokens
1 MEDIUM    β€” internal URLs, config values
AWS Access Key AKIAβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ in claude prompt 03/12
RSA Private Key -----BEGIN RSA PRIV... in cursor chat 03/09
PostgreSQL URI  postgresql://admin:β–ˆβ–ˆβ–ˆβ–ˆ@prod in copilot 03/11
... 166 more
β†’ Install CitrusGlaze proxy to block future leaks
Full report: ~/citrusglaze-report.html

AI Tools Scanned

Claude Code, Claude Desktop, Cursor, GitHub Copilot, ChatGPT, Gemini, Windsurf, Cody, Continue, Aider, and 29+ more

Secrets Detected

AWS keys, GCP service accounts, Azure tokens, database URIs, private keys, API tokens, Slack/GitHub/GitLab tokens, JWTs, and 200+ more patterns

How it works

1

Install

pip install citrusglaze-scan

2

Scan

Finds AI tool chat histories on your machine and scans for 254+ secret patterns

3

Review

Get an HTML report with every secret found, severity, and which AI tool it was sent to

254+
Secret Patterns
39+
AI Tools
0
Network Requests
15s
Scan Time

The average developer leaks 5 secrets per week to AI

We scanned real developer workstations. 13% of AI prompts contain sensitive data β€” AWS keys, database passwords, API tokens. Most developers never know.

100% Local

Zero network requests. Your data never leaves your machine. Verify in the source code.

Open Source

Read every line. No obfuscation, no telemetry, no hidden calls. MIT licensed.

No Signup Required

pip install and run. No account, no API key, no credit card. Results in 15 seconds.

What real scans find

These are real secret types found across developer workstations. Names and values redacted.

CRITICAL

AWS Access Key pasted into Cursor chat

Developer asked AI to debug an IAM policy and included the key. Found in 3 separate conversations over 2 weeks.

CRITICAL

PostgreSQL connection string with production credentials

Full URI including username, password, and hostname sent to Claude Code while debugging a migration.

HIGH

GitHub personal access token in Copilot context

Token embedded in a .env file that was included as context when asking for CI/CD help.

HIGH

Slack webhook URL shared with ChatGPT

Asking AI to help build a notification bot β€” webhook URL allows anyone to post to internal channels.

HIGH

RSA private key included in SSH debugging session

Developer pasted their private key into an AI prompt asking why SSH connections were failing.

Not ready to scan? Get the report first.

See what we found scanning thousands of real AI prompts β€” secrets, patterns, and the tools that leak the most.

No spam. Unsubscribe anytime. Your data stays private.

Found secrets? Block them in real-time.

The scanner shows what's already leaked. The CitrusGlaze proxy catches secrets before they reach AI providers β€” every request, zero latency.

FAQ

Does it send my data anywhere?

No. The scanner runs 100% locally. No network requests, no telemetry, no phone-home. Your data never leaves your machine. Check the source code yourself.

What AI tools does it support?

39+ tools including Claude Code, Claude Desktop, Cursor, GitHub Copilot, ChatGPT Desktop, Gemini, Windsurf, Cody, Continue, Aider, pip, npm, and more.

What's the difference between the scanner and the proxy?

The scanner checks your existing AI chat history for secrets that have already been sent. The proxy sits between your AI tools and the internet to block secrets in real-time before they're sent. Scan first, then install the proxy to prevent future leaks.

What Python version do I need?

Python 3.8 or newer. Works on macOS, Linux, and Windows. No compiled dependencies β€” pure Python with zero external packages.

How do I read the results?

The scanner generates an HTML report at ~/citrusglaze-report.html. Open it in your browser to see every secret found, its severity (Critical, High, Medium), which AI tool it was sent to, and the date.

Does it work on Windows and Linux?

Yes. The scanner works on macOS, Linux, and Windows. It's pure Python with zero compiled dependencies. On each platform it automatically finds the correct AI tool data directories.

Ready to find out?

One command. 15 seconds. No account, no signup, no data leaves your machine.

Then run citrusglaze-scan. Results in your browser.