Getting Started
Install Redactyl and run your first secret scan in under a minute
Installation
Using Go (Recommended)
go install github.com/redactyl/redactyl@latest
redactyl --helpUsing Homebrew (macOS)
brew install redactyl/tap/redactylFrom Source
git clone https://github.com/redactyl/redactyl.git
cd redactyl
make build
./bin/redactyl --versionTip: Add the local bin/ to PATH for this shell:
export PATH="$PWD/bin:$PATH"Quick Start
Interactive Scan (Default)
Navigate to any project directory and run:
redactyl scanThis opens the interactive TUI where you can browse findings, filter by severity, and take action on secrets. The TUI provides:
- Real-time findings with severity color-coding
- Vim-style navigation with search, filter, and grouping
- Syntax-highlighted context preview
- Quick actions: open in editor, baseline, ignore, export
- Virtual file extraction from archives
- Diff view to compare scans
CI/CD Mode (Non-Interactive)
For CI/CD pipelines, disable the TUI:
redactyl scan --no-tuiWith Guidance
Get suggested remediation commands:
redactyl scan --guide --no-tuiOutput Formats
JSON Output
redactyl scan --json # Auto-disables TUISARIF Output (for GitHub Code Scanning)
redactyl scan --sarif > redactyl.sarif.jsonText-Only Format
redactyl scan --text --no-tuiScope Control
Control what gets scanned:
# Staged changes only
redactyl scan --staged
# Last N commits
redactyl scan --history 5
# Diff vs base branch
redactyl scan --base mainDeep Artifact Scanning
Scan containers, Helm charts, and archives. The artifacts that actually run in production:
# Scan container images
redactyl scan --containers
# Scan Helm charts
redactyl scan --helm
# Scan Kubernetes manifests
redactyl scan --k8s
# Scan everything
redactyl scan --archives --containers --helm --k8sNext Steps
- Configuration - Set up
.redactyl.ymlfor your project - Deep Scanning Guide - Learn about artifact scanning and guardrails
- GitHub Actions - Add scanning to your CI/CD pipeline
- Registry Scanning - Scan remote container images