Package: wnpp
Severity: wishlist
Owner: Mikhail Potemkin <[email protected]>

* Package name    : trufflehog
  Version         : 3.60.4-1
  Upstream Author : Truffle Security
* URL             : https://github.com/trufflesecurity/trufflehog
* License         : GNU Affero General Public License v3.0
  Programming Lang: Go
  Description     : Find, verify, and analyze leaked credentials

 What is TruffleHog 🐽
 .
 TruffleHog is the most powerful secrets **Discovery, Classification,
 Validation,** and **Analysis** tool. In this context, secret refers to a
 credential a machine uses to authenticate itself to another machine.
 This includes API keys, database passwords, private encryption keys, and
 more.
 .
 Discovery πŸ”
 .
 TruffleHog can look for secrets in many places including Git, chats,
 wikis, logs, API testing platforms, object stores, filesystems and more.
 .
 Classification πŸ“
 .
 TruffleHog classifies over 800 secret types, mapping them back to the
 specific identity they belong to. Is it an AWS secret? Stripe secret?
 Cloudflare secret? Postgres password? SSL Private key? Sometimes it's
 hard to tell looking at it, so TruffleHog classifies everything it
 finds.
 .
 Validation βœ…
 .
 For every secret TruffleHog can classify, it can also log in to confirm
 if that secret is live or not. This step is critical to know if there’s
 an active present danger or not.
 .
 Analysis πŸ”¬
 .
 For the 20 some of the most commonly leaked out credential types,
 instead of sending one request to check if the secret can log in,
 TruffleHog can send many requests to learn everything there is to know
 about the secret. Who created it? What resources can it access? What
 permissions does it have on those resources?

Reply via email to