The 4-hour problem this solves in 90 seconds
Setting up production-grade pre-commit security from scratch takes most developers a full afternoon:
- Pick between gitleaks, trufflehog, detect-secrets, semgrep — they all catch different things.
- Wire pre-commit framework, version-pin every hook.
- Tune the gitleaks allowlist so docker-compose dev passwords and lockfile hashes stop spamming you.
- Add the Intuit/QBO patterns that gitleaks' default ruleset misses.
- Build CI workflows for daily dependency CVE scans.
- Test it all on a sandbox repo with planted credentials.
This pack is the assembled, tuned, tested result. bash setup.sh inside any repo, 90 seconds later you're
protected.
What's in the bundle
-
.pre-commit-config.yaml— version-pinned, ordered, with sensible defaults. -
.gitleaks.toml— tuned ruleset with seven custom detectors for Intuit/QBO, Anthropic, OpenAI, Discord webhooks, Slack webhooks, Railway tokens, generic bearer tokens. -
.trufflehog.yaml— path filters and--only-verifiedmode for low-noise live-credential detection. -
setup.sh+setup.ps1— cross-platform installer (Linux/macOS/WSL + Windows). - GitHub Actions templates — daily
pip-auditandnpm auditcron workflows. - Hash-pinning template — the
pip-compile --generate-hashesworkflow most devs skip. - EXAMPLES.md — five worked examples of catches, each with the exact scan output and recommended fix.
- FALSE_POSITIVES.md — pre-built allowlist for the noise that bites every team.
- MIT license — use it in commercial projects, fork it, modify it.
Built for two real failure modes
The accidental commit (95% of leaks)
You're racing to ship before a demo. You inline an API key "just to
test it locally," forget about it, and git commit -am "fix".
The credential is now in your git history forever.
This pack rejects that commit before it lands on disk. You see a clear error, fix the code, move on. No rotation, no panic, no Slack thread.
The dependency CVE that drops next week
Your requirements.txt was clean when you committed it.
Three days later, a critical CVE drops on a transitive dep. Without a
daily scheduled scan, you find out from a news headline.
The included GitHub Actions workflows run pip-audit /
npm audit every morning at 6 AM. New CVE in your locked
deps → failed build → Slack alert. Caught in 24 hours, not 24 days.
This pack is the opinionated assembly — every individual tool is open-source and free. What you're paying for is the 4 hours of assembly + tuning + verification, replaced with a 90-second install.