Documentation

Welcome to the How2Validate documentation.


This site is a work in progress. If you encounter any placeholder text, it means I’m still in the process of updating that section. For the latest updates, You can follow updates on Github Discussions.

How2Validate is a versatile security tool designed to streamline the process of validating sensitive secrets across various platforms and services.

Whether you're a developer, security professional, or DevOps engineer, How2Validate empowers you to ensure the authenticity and security of your API keys, tokens, and other critical information.

By leveraging the power of Python, JavaScript, and Docker, How2Validate offers a flexible and efficient solution for validating secrets against official provider endpoints. Its user-friendly command-line interface (CLI) makes it easy validating secrets, allowing you to quickly and accurately verify the integrity of your sensitive data.

Explore us

Why How2Validate ?

Learn why to use How2Validate for automating secret validation and ensuring security compliance.

View

Installation and Usage

The documentation for installation and usage of multiple platforms.

View

API Reference

Detailed documentation of the How2Validate API for both JavaScript and Python.

View

Email Report

The documentation for Email reporting.

View

FAQ's

The frequently asked queries and their solution.

View