You'll be familiar with web bugs, the transparent images which track when someone opens an email. They work by embedding a unique URL in a page's image tag, and monitoring incoming GET requests.
Imagine doing that, but for file reads, database queries, process executions or patterns in log files. Canarytokens does all this and more, letting you implant traps in your production systems rather than setting up separate honeypots.
Canarytokens are a free, quick, painless way to help defenders discover they've been breached (by having attackers announce themselves.)
Includes web bugs, DNS hostnames, fake AWS keys, login certificates, commands, documents, API keys, and more.