Skip to main content

A fast CLI to fingerprint SSH private keys and identify which Git hosting accounts they unlock

Project description

๐Ÿ”‘ KeyChecker

A fast CLI tool to fingerprint SSH private keys and identify which Git hosting accounts they unlock (GitHub, GitLab, Bitbucket, Codeberg, Gitea, Hugging Face).

๐Ÿ”ฌ Part of Cyfinoid Research's Software Supply Chain Security Research
This tool is created by Cyfinoid Research as part of our offensive tooling research focused on identification of next steps once an SSH private key is discovered. Learn more about our software supply chain security research and training programs.


โœจ Features

๐Ÿ” Key Intelligence

  • Multi-format support: OpenSSH, PEM, and DER private key formats
  • Key type detection: ed25519, rsa, ecdsa, dsa with security analysis
  • Security validation: Flags deprecated/insecure algorithms and weak key sizes
  • Passphrase detection: Identifies if private keys are encrypted
  • Metadata extraction: Public key, fingerprints (SHA256/MD5), and comments
  • Insight parsing: Extracts local username, hostname, and IP addresses from comments

๐ŸŒ Account Discovery

  • Multi-provider support: GitHub, GitLab, Bitbucket, Codeberg, Gitea, Hugging Face
  • Safe SSH handshakes: Read-only validation without triggering repo operations
  • Username extraction: Parses SSH identity banners to recover mapped usernames
  • Organization discovery: Identifies user membership in organizations (GitHub API)

๐Ÿ“ Repository Discovery

  • Private repo detection: Uses git ls-remote probes with wordlists
  • Concurrent scanning: Configurable parallel connections for speed
  • Progress tracking: Real-time progress bars during discovery
  • API integration: GitHub token support for enhanced organization discovery

๐Ÿ“Š Output Modes

  • Human-readable tables: Clean, formatted output by default
  • Exit codes: Automation-friendly return codes
  • Verbose logging: Debug and trace information
  • Public key export: Save derived public keys to files

๐Ÿš€ Quick Start

Installation

# Using pipx (recommended for end users)
pipx install keychecker

# Using uv (recommended for developers)
uv add keychecker

# Using pip (legacy)
pip install --user keychecker

# From source (development)
git clone https://github.com/cyfinoid/keychecker
cd keychecker
./scripts/install.sh           # Install uv with pinned version & hashes
./scripts/setup-dev.sh         # Set up development environment

Basic Usage

# Analyze a private key and Validate against servers (default behavior)
keychecker ~/.ssh/id_ed25519

# Validate against specific servers only
keychecker ~/.ssh/id_ed25519 --validate github gitlab bitbucket codeberg gitea huggingface

# Validate against specific servers only
keychecker ~/.ssh/id_rsa --validate github gitlab huggingface

# Skip server validation (local analysis only)
keychecker ~/.ssh/id_ed25519 --no-validate

Repository Discovery

# Discover private repositories on GitHub
keychecker ~/.ssh/id_rsa --validate github --discovery repo_names.txt

# Discover private repositories on Hugging Face
keychecker ~/.ssh/id_rsa --validate huggingface --discovery repo_names.txt

# With GitHub API token for enhanced organization discovery
export GITHUB_TOKEN=ghp_your_token_here
keychecker ~/.ssh/id_rsa --validate github --discovery repo_names.txt

# Or pass token directly
keychecker ~/.ssh/id_rsa --validate github --discovery repo_names.txt --github-token ghp_your_token_here

๐Ÿ“– Usage Reference

Command Line Options

keychecker INPUT [OPTIONS]

Positional Arguments:
  INPUT                 Path to private key file

Options:
  -i, --input PATH      Path to private key file (alternative to positional)
  
  --validate SERVERS    One or more servers to validate against
                        Choices: github, gitlab, bitbucket, codeberg, gitea, huggingface
  --no-validate         Skip server validation (local analysis only)
  
  --discovery FILE      Enable repository discovery with wordlist file
  
  --github-token TOKEN  GitHub API token for enhanced organization discovery
  --no-progress         Disable progress bars during repository discovery
  
  --public-out FILE     Save derived public key to file
  --no-banner           Suppress banner output
  
  --timeout SECONDS     Per-connection timeout (default: 5)
  --concurrency N       Parallel connections (default: 10)
  
  -v, --verbose         Enable debug/trace logs
  -V, --version         Show version number and exit
  -h, --help            Show help message

Examples

# Basic key analysis
keychecker ~/.ssh/id_ed25519

# Validate against GitHub only
keychecker ~/.ssh/id_rsa --validate github

# Validate against Hugging Face only
keychecker ~/.ssh/id_rsa --validate huggingface

# Discover repositories with custom wordlist
keychecker ~/.ssh/id_rsa --validate github --discovery my_repos.txt

# Discover repositories on Hugging Face
keychecker ~/.ssh/id_rsa --validate huggingface --discovery my_repos.txt

# Save public key to file
keychecker ~/.ssh/id_ed25519 --public-out my_key.pub

# Verbose output with custom timeout
keychecker ~/.ssh/id_rsa --validate github --timeout 10 --verbose

# Check version
keychecker --version

๐ŸŒ Supported Servers

Server Host Features Notes
GitHub git@github.com Username extraction, Organization discovery SaaS platform
GitLab git@gitlab.com Username extraction SaaS and Selfhostable platform
Bitbucket git@bitbucket.org Key confirmation SaaS Platform
Codeberg git@codeberg.org Username extraction SaaS based on forgejo
Gitea git@gitea.com Username extraction Saas based on Gitea
Hugging Face git@hf.co Username extraction AI/ML model hosting platform

๐Ÿ“‹ Example Output

Key Analysis

๐Ÿ”‘ KeyChecker - SSH Key Analysis Tool
=====================================

Key: ~/.ssh/id_ed25519
Type: ed25519
Bits: 256
Passphrase: NO
Public: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAI... comment='user@hostname'
Comment: user@hostname
SHA256: SHA256:abc123...
MD5: MD5:12:34:56:78:9a:bc:de:f0

Insights: local_user=user, host=hostname

Server Validation

Validation:
- github: username=john_doe โœ…
- gitlab: username=jane_smith โœ…
- bitbucket: auth success, username=? (repo path required)
- huggingface: username=anantshri โœ…

Repository Discovery

Organization Discovery:
- Personal repositories: john_doe
- Organizations: acme-corp, open-source-proj

Repository Discovery:
Found 3 accessible repositories:
- john_doe/secret-project (private)
- acme-corp/internal-tools (private)
- acme-corp/api-service (private)

๐Ÿ” Security Notes

  • Read-only operations: No repositorywrite operations performed
  • Local processing: Private keys are processed in-memory, never uploaded
  • Authorized use only: Only use against keys you own or are authorized to test
  • SSH handshake logging: Some providers may log SSH connections - use responsibly

๐Ÿ›  Development

Setup Development Environment

git clone https://github.com/cyfinoid/keychecker
cd keychecker

# Install uv (if not already installed)
./scripts/install.sh

# Set up development environment
./scripts/setup-dev.sh

# Run tests
./scripts/test.sh

# Run demo
uv run python examples/demo.py

Project Structure

keychecker/
โ”œโ”€โ”€ keychecker/
โ”‚   โ”œโ”€โ”€ core/           # Core analysis and validation logic
โ”‚   โ”œโ”€โ”€ plugins/        # Git hosting provider implementations
โ”‚   โ”œโ”€โ”€ utils/          # Output formatting and utilities
โ”‚   โ”œโ”€โ”€ cli.py          # Command-line interface
โ”‚   โ””โ”€โ”€ __main__.py     # Entry point
โ”œโ”€โ”€ examples/           # Usage examples and sample data
โ”œโ”€โ”€ tests/              # Test suite
โ””โ”€โ”€ docs/               # Documentation

Adding New Providers

KeyChecker uses a plugin architecture for Git hosting providers. To add a new provider:

  1. Create a new provider class in keychecker/plugins/
  2. Inherit from BaseGitProvider
  3. Implement required methods: validate_key(), identify_user(), discover_organizations()
  4. Register the provider in keychecker/plugins/__init__.py

Development Scripts

The project includes shell scripts to automate common tasks:

# Install uv (if needed)
./scripts/install.sh

# Set up development environment
./scripts/setup-dev.sh

# Run tests and quality checks
./scripts/test.sh

# Clean development environment
./scripts/clean.sh

# Build package for distribution
./scripts/build.sh

# Update version number
./scripts/version.sh 1.0.2

Release Workflow

# Test publication workflow (recommended)
# 1. Use GitHub Actions to publish to TestPyPI:
#    - Go to Actions tab โ†’ "Publish to PyPI" โ†’ "Run workflow"
#    - Enter a test version (e.g., 1.0.2-rc1)
#    - This will test installation with pip, pipx, and uv (with --pre flag for pre-releases)
# 2. Create a GitHub release to publish to PyPI:
#    - Version consistency is automatically verified
#    - Production publication with full testing (stable versions only)

Alternatives

# Manual publication (alternative)
export TESTPYPI_API_TOKEN=your_token
./scripts/publish-testpypi.sh

export PYPI_API_TOKEN=your_token
./scripts/publish-pypi.sh

See scripts/README.md for detailed script documentation.


๐Ÿ“Š Exit Codes

Code Meaning
0 Success
1 Runtime/IO/argument error
2 All servers unreachable
3 Repository discovery attempted, no repositories found
4 Key parsed but flagged (deprecated/insecure)

๐Ÿ—บ๏ธ Roadmap

  • Self-hosted environments: Support for custom GitLab, Bitbucket, and Gitea instances
  • Arbitrary hosts: Generic SSH server validation with custom host/port configuration
  • Host discovery: Automatic detection of Git server type and capabilities
  • Cloud Git platforms: Support for Azure DevOps, AWS CodeCommit, Google Cloud Source Repositories
  • Enterprise platforms: Integration with enterprise Git solutions
  • Public repository filtering: Skip public repositories during discovery (no point in bruteforcing)
  • Intelligent wordlists: Generate repository name candidates based on discovered organizations
  • Rate limit awareness: Adaptive discovery speed based on server rate limits

Quality of Life Improvement

  • OIDC Publication: Move publication and release to OIDC aware setup

๐Ÿค– AI-Assisted Development

This project was developed with the assistance of AI tools, most notably Cursor IDE, Claude Code, and Qwen3-Coder. These tools helped accelerate development and improve velocity. All AI-generated code has been carefully reviewed and validated through human inspection to ensure it aligns with the projectโ€™s intended functionality and quality standards.


๐Ÿค Contributing

We welcome contributions! Please see our Contributing Guidelines for details.

Development Setup

# Clone and setup
git clone https://github.com/cyfinoid/keychecker
cd keychecker

# Install uv and setup development environment
./scripts/install.sh
./scripts/setup-dev.sh

# Run tests
./scripts/test.sh

Development Workflow

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Add tests for new functionality
  5. Run the test suite: ./scripts/test.sh
  6. Submit a pull request

For detailed development instructions, see scripts/README.md.


๐Ÿ’ฌ Community & Discussion

Join our Discord server for discussions, questions, and collaboration:

Join our Discord Server

Connect with other security researchers, share your findings, and get help with KeyChecker usage and development.


๐Ÿ™ Acknowledgments & Contributions

Contributors

We'd like to thank the following contributors for their valuable input and support:

  • Kumar Ashwin - Initial ideation and help with PoC building

๐Ÿ“„ License

This project is licensed under the GNU General Public License v3 (GPLv3) - see the LICENSE file for details.


โš ๏ธ Disclaimer

This tool is designed for security auditing and penetration testing of systems you own or have explicit permission to test. Always ensure you have proper authorization before using this tool against any systems or keys you don't own.

The authors are not responsible for any misuse of this software.


๐Ÿ”ฌ Cyfinoid Research

Cutting-Edge Software Supply Chain Security Research

Pioneering advanced software supply chain security research and developing innovative offensive security tools for the community.

This tool is part of our free research toolkit - helping security researchers and penetration testers identify next steps after discovering SSH private keys.

๐ŸŒ Software Supply Chain Focus

Specializing in software supply chain attacks, CI/CD pipeline security, and offensive security research.

Our research tools help organizations understand their software supply chain vulnerabilities and develop effective defense strategies.

๐ŸŽ“ Learn & Explore

Explore our professional training programs, latest research insights, and free open source tools developed from our cutting-edge cybersecurity research.

Upcoming Trainings | Read Our Blog | Open Source by Cyfinoid

Hands-on training in software supply chain security, CI/CD pipeline attacks, and offensive security techniques

ยฉ 2025 Cyfinoid Research. KeyChecker - Free Software Supply Chain Security Research Tool

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

keychecker-1.1.0.tar.gz (45.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

keychecker-1.1.0-py3-none-any.whl (48.8 kB view details)

Uploaded Python 3

File details

Details for the file keychecker-1.1.0.tar.gz.

File metadata

  • Download URL: keychecker-1.1.0.tar.gz
  • Upload date:
  • Size: 45.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.9.23

File hashes

Hashes for keychecker-1.1.0.tar.gz
Algorithm Hash digest
SHA256 fd5f6e1af6b62b4fe12d649699b046e2178d74861fe0ed8ebeed9a9419128013
MD5 82ca216bb6e9a9e3178f6380779f7703
BLAKE2b-256 27f8be6682de0494daa14af81bf17005da05655ddab3900070f2c2d8de882ade

See more details on using hashes here.

File details

Details for the file keychecker-1.1.0-py3-none-any.whl.

File metadata

  • Download URL: keychecker-1.1.0-py3-none-any.whl
  • Upload date:
  • Size: 48.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.9.23

File hashes

Hashes for keychecker-1.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 cb4ef18529b56c4635ace060b11a57e6a57a04ac285fef044bee3b1eae8b4a20
MD5 e625ad08b00fd55d3827d76104fd8cab
BLAKE2b-256 1814f569f25a597e489b07f3e166364510115ed6196725bc1b30aa0b9c0e62bd

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page