Skip to main content
Version: 3.13-dev

Exposed Secrets

Security > Container Scanning > Exposed Secrets lists credentials and other sensitive material found inside container images (or related artifacts the scanner inspects), such as API keys, tokens, passwords, or private keys embedded in layers or files. This is separate from vulnerability (CVE) reporting: an image can have no critical CVEs and still contain a leaked secret.

Depending on how your environment is configured, you may get:

  • Findings tied to a scanned image or workload, with severity or risk indicators.
  • Location hints (path, layer, or context) so you can trace the issue back to a build step, copied config, or baked-in file.
  • Actions or links to open details and follow remediation guidance.

Use this view to rotate any exposed credential and change the build so secrets are never committed into images (runtime Secret objects, external secrets, CI variables, .dockerignore, multi-stage builds without copying .env, etc.).

This is how this fits Container Scanning: