Every PHP project that reaches production carries an invisible attack surface: the .env file. Developers routinely commit secrets to git by accident, reuse the same credentials across staging and production, leave placeholder values in place after onboarding, and rely on filesystem permissions that expose secret files to anyone on the shared server. The problem compounds with scale — a team of five generating a handful of environment files becomes a team of twenty with overlapping .env.staging, .env.testing, and backup files, none of which are consistently audited.
The more insidious half of the problem lives in git history. A secret that was committed once and then deleted is still fully retrievable by anyone who can clone the repository. Without tooling that actively scans history, teams operate under a false sense of security — believing that removing a secret from the current branch means it is gone. Beyond discovery, there was no free tool that could definitively answer whether a current production credential had ever appeared in a commit, making rotation decisions speculative rather than evidence-based.
Existing solutions were either expensive commercial platforms, incomplete scripts checking only one dimension of the problem, or generic secret scanners with no understanding of environment variable hygiene, codebase usage patterns, or cross-environment consistency. The goal was a single open-source CLI that ran in seconds, covered every dimension of the problem, and integrated cleanly into any CI/CD pipeline without configuration.