Use this template
Open Secret Scanner in Devin and create the automation with the default configuration. You can customize it before saving.
What this automation does
Unlike one-shot scanners, this automation runs on an ongoing cadence and includes the human-steerable workflow: confirm the finding, rotate the credential, verify the rotation, and remove the secret from git history. Devin drives each step so your team doesn’t have to remember the rotation playbook.How it works
Trigger: Schedule event —recurring
- Event:
schedule:recurring- Conditions:
rrulematchesFREQ=DAILY;BYHOUR=9;BYMINUTE=0
- Conditions:
Prerequisites
- Integrations:
Example prompt
The template ships with this prompt. You can edit it after clicking Use template, or leave it as-is.Setting it up
- Open Automations → Templates in Devin.
- Click Secret Scanner. The create page opens with this template pre-filled.
- Connect any required integrations and install MCP servers if you haven’t already.
- Replace any placeholder values in the trigger conditions (for example, swap
your-org/your-repofor your actual repo). - Review the prompt and adjust it for your team’s language, conventions, and guardrails.
- Click Create automation.
When to use this template
- Proactive detection of accidentally committed secrets
- Onboarding legacy repos to stricter secret-scanning policies
- Compliance programs requiring documented secret rotation
- Post-incident sweeps after a public leak
Customization ideas
- Configure which secret patterns matter most (AWS, Stripe, Slack, internal)
- Integrate with your secret manager for automatic rotation steps
- Scope to specific repos or branches
- Route critical findings to an incident response channel
