A secrets scanning tool that discovers, classifies, validates, and analyzes leaked credentials across multiple sources.
TruffleHog is an open-source security tool that scans for leaked credentials across various data sources, including Git repositories, cloud storage, and collaboration platforms. It not only detects secrets but also verifies them against live APIs to confirm their validity and analyzes their permissions to assess risk.
Security engineers, DevOps teams, and developers who need to proactively identify and remediate exposed credentials in their codebases, infrastructure, and third-party integrations.
Developers choose TruffleHog for its extensive detector library, active verification that eliminates false positives, and support for a wide range of sources—all in a single, self-hostable tool that integrates seamlessly into CI/CD pipelines.
Find, verify, and analyze leaked credentials
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Identifies over 800 secret types across services like AWS, Stripe, and Cloudflare, ensuring broad coverage for leaked credentials, as highlighted in the README.
Tests credentials against live APIs to confirm validity, focusing efforts on actual security threats rather than noise, which is a core feature described in the documentation.
Supports scanning Git repositories, cloud storage, Docker images, CI systems, and more with native scanners, making it a one-stop tool for various data sources.
Offers GitHub Actions, GitLab CI, and pre-commit hooks for easy embedding into development pipelines, as detailed with examples in the README.
Scanning GitHub organizations can be slow due to rate limits without authentication, and experimental features like object discovery take hours, as admitted in the documentation.
Configuring custom detectors, multi-scan setups, and handling numerous command-line flags requires significant technical expertise and time, which can be daunting for beginners.
Continuous monitoring of sources like Jira and Slack is only available in the paid enterprise version, restricting the open-source tool's capabilities for comprehensive security.