Getting Started with Pipeleek
Why Pipeleek?
Scanning for credentials in CI/CD pipelines is interesting because secrets often end up in pipeline logs or build artifacts that traditional Git scanners won’t check. This means you can catch leaked secrets that are injected or generated at runtime, not just those committed to Git.
Once secrets are discovered, further exploitation often requires additional tooling. Pipeleek provides several helper commands to assist with this process.
Installation
Quick Install (Linux/macOS)
Install the latest version with a single command:
⚠️ Security Warning: Piping scripts directly to
shcan be dangerous. Always review the script contents first at https://compasssecurity.github.io/pipeleek/install.sh before executing.
Install with Go
Alternatively, install using Go:
Linux
-
Visit the Pipeleek GitHub Releases page.
-
Download the binary for your architecture:
-
For Linux amd64:
pipeleek_<version>_linux_amd64 -
For Linux arm64:
pipeleek_<version>_linux_arm64 -
Make it executable and run it:
You can rename and move it to a directory in your PATH:
macOS
-
Visit the Pipeleek GitHub Releases page.
-
Download the binary for your Mac architecture:
-
For Intel Macs (amd64):
pipeleek_<version>_darwin_amd64 -
For Apple Silicon Macs (arm64):
pipeleek_<version>_darwin_arm64 -
Make it executable and run it:
You can move and rename it to a directory in your PATH:
Note: On first run, macOS may block the binary. You can allow it in System Settings → Privacy & Security, or run:
Windows
-
Visit the Pipeleek GitHub Releases page.
-
Download the Windows binary for your architecture:
-
For Windows amd64:
pipeleek_<version>_windows_amd64.exe -
For Windows arm64:
pipeleek_<version>_windows_arm64.exe -
Open PowerShell or Command Prompt and verify installation:
You can rename it for convenience:
Platform-Specific Binaries
Pipeleek also provides platform-specific binaries that include only the commands for a specific platform. These are smaller and can be downloaded manually at Pipeleek GitHub Releases:
pipeleek-gitlab_<version>_<os>_<arch>- GitLab commands onlypipeleek-github_<version>_<os>_<arch>- GitHub commands onlypipeleek-bitbucket_<version>_<os>_<arch>- BitBucket commands onlypipeleek-devops_<version>_<os>_<arch>- Azure DevOps commands onlypipeleek-gitea_<version>_<os>_<arch>- Gitea commands only
Usage Examples
Basic Scanning
The most basic example to scan e.g. GitLab pipeline logs for secrets.
Scanning Artifacts
In addition to logs, Pipeleek can also scan artifacts generated by pipelines.
💡Tip: All
scancommands must be configured to scan artifacts. This feature is disabled by default.