That’s the quiet danger of certificate rotation. It’s not the easy ones you see coming—it’s the buried secrets-in-code, the outdated certs in a repo, the unused key you forgot to remove. Those small oversights open cracks for outages and attacks. They’re the landmines in an otherwise clean build.
Secrets-in-code scanning has grown beyond simple regex hunting. Modern pipelines can detect certificates, keys, and tokens tucked inside source, configs, and binaries. They can flag upcoming expirations and trigger automated rotation. Yet scanning alone isn’t enough unless it feeds into disciplined rotation policies. Without rotation, scans just make a list; with rotation, they prevent the fire.
The tight link between certificate rotation and secrets-in-code scanning is this: rotation is only safe and effective when you actually know all your certs, keys, and tokens. Code scanning reveals them—even the ones you didn’t realize were committed. That’s how you discover the cert generated for a quick test two years ago, or the one hardwired into a script, waiting to surprise you.