Join us

ContentUpdates and recent posts about TruffleHog..
Link
@anjali shared a link, 5 months ago
Customer Marketing Manager, Last9

OTel Updates: Unroll Processor Now in Collector Contrib

The OTel unroll processor splits bundled log records into individual events. Now in Collector Contrib v0.137.0 for VPC and CloudWatch logs.

Unroll Processor
Story
@laura_garcia shared a post, 5 months, 1 week ago
Software Developer, RELIANOID

Tesco’s latest outage is a reminder: uptime IS the customer experience.

Shoppers across the UK faced checkout failures, broken order updates, and Clubcard access issues as Tesco’s digital platforms suffered “intermittent” instability. In modern retail, even brief disruptions damage trust, loyalty, and sales. At RELIANOID, we help retailers stay resilient with intelligen..

tesco outage
Link
@anjali shared a link, 5 months, 1 week ago
Customer Marketing Manager, Last9

Instrumentation: Getting Signals In

See how instrumentation in OpenTelemetry helps track app issues, know the difference between auto and manual methods, and when to use them.

otel_metrics_quarkus
 Activity
@devopslinks added a new tool Syft , 5 months, 1 week ago.
 Activity
@kaptain added a new tool KubeLinter , 5 months, 1 week ago.
 Activity
@devopslinks added a new tool Grype , 5 months, 1 week ago.
 Activity
@kaptain added a new tool Hadolint , 5 months, 1 week ago.
 Activity
@varbear added a new tool Bandit , 5 months, 1 week ago.
 Activity
@devopslinks added a new tool JFrog Xray , 5 months, 1 week ago.
 Activity
@devopslinks added a new tool OWASP Dependency-Check , 5 months, 1 week ago.
TruffleHog is a high-accuracy secret-detection tool designed to uncover exposed credentials such as API keys, tokens, private keys, and cloud secrets across large codebases. Originally created to scan Git commit history, it has evolved into a multi-source scanning engine capable of analyzing GitHub, GitLab, Bitbucket, Docker images, file systems, Terraform states, and cloud environments.

The scanner combines entropy detection, an extensive library of regular expression detectors, and live credential validation to minimize false positives. TruffleHog is widely used in security research, supply chain security, DevSecOps workflows, and bug bounty programs. Its speed, accuracy, and broad ecosystem coverage make it a core tool for identifying and preventing credential leakage in modern software development.