Upload files
Drag and drop multiple files or choose from your device (up to 50 MB each).
Drop files here
or click to browse
0 files selected
No files selected yet.
Detector configuration
Reuse the same detector configuration flow as source creation.
0 visible0 enabled
Reusable Custom Detectors
Select from the detector catalog. Create or train detectors on the dedicated page.
0 selected0 available
Loading detectors...
Credential leaks, code issues, and high-risk security signals.
Secrets DetectorSECRETS
SECURITYCOMPLIANCEP0active9 patterns
Presets
Pick a business-ready baseline, then customize only where needed.
Advanced settings
Thresholds, model parameters, and pattern-level controls.
Code Security DetectorCODE SECURITY
SECURITYTHREATP3active
Presets
Pick a business-ready baseline, then customize only where needed.
Advanced settings
Thresholds, model parameters, and pattern-level controls.