./security/trufflehog, Find credentials all over the place

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 3.10.3, Package name: trufflehog-3.10.3, Maintainer: leot

TruffleHog finds leaked credentials by scanning several sources like
Git, GitHub, GitLab, S3, filesystems and syslog.

Every potential secret that is detected is verified against an API to
eliminate false positives.


Master sites:

Filesize: 491.283 KB

Version history: (Expand)


CVS history: (Expand)


   2022-09-17 13:03:57 by Leonardo Taccari | Files touched by this commit (3)
Log message:
trufflehog: Update to 3.10.3

Changes:
3.10.3
------
 - Use gitparse for unstaged changes.
   2022-09-07 11:32:31 by Benny Siegert | Files touched by this commit (114) | Package updated
Log message:
Revbump all Go packages after go118 security update
   2022-09-02 21:28:16 by Leonardo Taccari | Files touched by this commit (4)
Log message:
trufflehog: Update to 3.10.2

Changes:
v3.10.2
-------
What's Changed

  * Split parsing from reader
  * Fix Honeycomb detector with older key format
  * clean up detectors

v3.10.1
-------
What's Changed

  * added new detectors
  * Enhancement in Gitlab detector
  * fix and make_protos
  * [OC-71] - Add helper methods to context to set metatada token values for
    the API
  * fix issue in codacy
  * Fix okta detector

v3.10.0
-------
What's Changed

  * Allow secrets to be passed as env vars
  * Import 27 new detectors
  * [THOG-643] Implement independent log level controls
  * Add common sentry recover library and add into goroutines
  * added new detectors

v3.9.0
------
What's Changed

  * Add Honeycomb detector
  * Feature/scalr detector
  * added websitepulse detector
  * added tokeet detector
  * Feature/salesmate detector
  * added kanbantool detector
  * added demio detector
  * added heatmapapi detector
  * added getresponse detector
  * added codeclimate detector
  * added flightlabs detector
  * added prodpad detector
  * added lemlist detector
  * added formsite detector
  * added docparser detector
  * added parseur detector
  * Added ecostruxureit detector
  * Added transferwise detector
  * Added holistic detector
  * Added twist detector
  * Added monkeylearn detector
  * Added gtmetrix detector
  * Added duply detector
  * Added braintreepayments detector
  * added apilayer scanner
  * added appointed scanner
  * [bug] - Fix the starting index value for plus line check.

v3.8.0
------
What's Changed
  * Support scanning binary files in git sources
  * Add the slack client token to the slack tokens proto
  * Added support for SSH URIs
  * Use file handler and common chunker
  * Add ssh:// URI to docs

v3.7.3
------
  * AWS detector should detect with leading '+'
  * Add hash v2 to results proto.
   2022-08-12 22:38:12 by Benny Siegert | Files touched by this commit (114) | Package updated
Log message:
Revbump all Go packages after go118 security update
   2022-08-08 03:59:33 by David H. Gutteridge | Files touched by this commit (1)
Log message:
trufflehog: adjust grammar in DESCR
   2022-08-08 00:21:38 by Leonardo Taccari | Files touched by this commit (6)
Log message:
trufflehog: Import trufflehog-3.7.2 as security/trufflehog

TruffleHog find leaked credentials by scanning several sources like
Git, GitHub, GitLab, S3, filesystem and syslog.

Every potential secret that is detected is verified against API to
eliminate false positives.