psst
Your team shares secrets in Slack. It happens. psst catches leaked API keys, tokens, and credentials before they spread. No shame, no blame, just a quiet heads up.
dashboard.stripe.com/apikeys
How it works
Add psst to Slack. It watches every message, matches against 40+ patterns, and handles it quietly.
Scan
Every message checked in real-time against compiled regexes. Fast enough that nobody notices.
Match
AWS keys, GitHub PATs, Stripe tokens, private keys, JWTs, connection strings, SSNs. The usual suspects.
Act
Thread reply, DM, auto-delete, alert the security channel. Configurable per severity. Critical stuff gets removed immediately.
Log
Every detection recorded in SQLite. Who, when, what matched, what psst did about it.
40+ patterns, or bring your own
Ships with coverage for the things people actually paste. Add custom patterns in YAML.
Config as code
YAML config, version controllable, PR your detection patterns. Or use the Slack app home GUI. They stay in sync.
Self-hosted or we run it for you
Your data never has to leave your infra. Or don't think about infra at all.
self-hosted
hosted
Why this exists
Most DLP tools are built for compliance teams. Enterprise dashboards, ML black boxes, scary "VIOLATION DETECTED" alerts. psst is built for engineers who kept seeing API keys in Slack and thought "someone should fix this." Transparent regex you can read. Friendly messages that help, not shame. Config as code, not enterprise UI.
Free while we figure out pricing.
psst is open source and free to self-host forever. The hosted version is in beta. Everything works, we just haven't gotten around to charging for it yet.
- Unlimited Slack workspaces
- 40+ built-in detection patterns
- Custom pattern support
- Auto-redaction + DM notifications
- Full detection audit log