Deception Tech

Amidst AI, disinformation, and bots.. can you spot the human?

Try Again


Some attackers are sentient, some are not. None of the humans above exist. They are all AI generated. Separating the signal from the noise is hard.


Intent + Action

There are critical parts of your systems/apps that no external entities should have access to. Tripped honeytokens reveal not just the presence of but the intent of attackers.



By using honeytokens per pull request (on a deploy branch), you get high fidelity, and high cardinality breach signal.

You can even figure out if your team need more security training too!

Because security can and should be black and white.

Combat F.U.D. with high fidelity and high cardinality breach detection.

How it Works

PanSift installs as a Github App on a chosen repository. It honeytokens with Thinkst canarytokens out-of-the-box!

Attacker Phases

Operating in a post-breach world.

It is inevitable that attackers will exploit a vulnerability and get some level of initial access to your infrastructure, systems, or apps. They don't sit still and continue to penetrate deeper, move laterally, and attempt to escalate privileges to gather data. They harvest access credentials, API keys, and hostnames related to key accounts or systems.

What is a Honeytoken

Inexpensive Lures with Super Signal !

A honeytoken is a digital lure or tripwire. They can be pseudo-valid usernames/passwords, an API key, a hostname, a PDF file, or other digital asset. They are designed so that once they are accessed or used, they alert your security team (like a canary in a coal mine!). A good example is a set of AWS client/secret keys left in a configuration file that no one but trusted staff should have access to. Once used or accessed, the honeytoken is tripped, and it's time to react to this high-fidelity signal of intrusion.

Detect and Defend

From months to minutes...

PanSift empowers your defenders and developers to gain the upper hand by amplifying their situational awareness, enabling rapid incident response, and increasing peace of mind! Embrace a new form of continuous determinstic security and don't leave your organisation or customer data exposed for months!

Install Pansift

Per Pull Request on Nominated Branches

PanSift does not need nor request access to your code. PanSift automatically honeytokens a specific file per Pull Request. You can leave a honeytoken there or move it to other parts of your build during deploys (dress them up as you see fit)! Use PanSift across private repositories/branches that are deployed anywhere where there is risk of exploit, attack, or compromise such as Internet facing SaaS, cloud infrastructure, or restricted internal systems or apps.

Watch an Example Rapid Install and Tokening

Read more about Deception Tech

Take back control while increasing your Security Observability!

Test Install

Test on a personal private Github repo!

Live App Tour

A no strings fully featured live tour!