The first time I saw personal data spill out of a codebase, it wasn’t in production. It was in a forgotten test file, hidden in plain sight, waiting to become a breach.
Data subject rights aren’t just legal checkboxes. They are live wires running through every repo. When you scan code without thinking about GDPR, CCPA, or other privacy frameworks, you miss the quiet risks that live in constants, logs, commits, and debug statements. Secrets-in-code scanning is no longer just about AWS keys or passwords. Today, it’s about spotting the personal data that triggers subject access requests before it ever ships.
The secret is context. A good scanner doesn’t just match regex patterns. It understands when that random string is actually a phone number, when hardcoded JSON includes a birthdate, or when a variable name hints at sensitive identity fields. Most teams treat data mapping as an operational afterthought. But if you build scanning into your CI at the pull request, you create an always-on privacy firewall inside your development cycle.