Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Searches through git repositories for high entropy strings and secrets, digging deep into commit history

License

Notifications You must be signed in to change notification settings

javamickey/truffleHog

Repository files navigation

truffleHog

Build Status codecov

Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets accidentally committed.

NEW

truffleHog previously functioned by running entropy checks on git diffs. This functionality still exists, but high signal regex checks have been added, and the ability to surpress entropy checking has also been added.

truffleHog --regex --entropy=False https://github.com/dxa4481/truffleHog.git

or

truffleHog file:///user/dxa4481/codeprojects/truffleHog/

With the --include_paths and --exclude_paths options, it is also possible to limit scanning to a subset of objects in the Git history by defining regular expressions (one per line) in a file to match the targeted object paths. To illustrate, see the example include and exclude files below:

include-patterns.txt:

src/
# lines beginning with "#" are treated as comments and are ignored
gradle/
# regexes must match the entire path, but can use python's regex syntax for
# case-insensitive matching and other advanced options
(?i).*\.(properties|conf|ini|txt|y(a)?ml)$
(.*/)?id_[rd]sa$

exclude-patterns.txt:

(.*/)?\.classpath$
.*\.jmx$
(.*/)?test/(.*/)?resources/

These filter files could then be applied by:

trufflehog --include_paths include-patterns.txt --exclude_paths exclude-patterns.txt file://path/to/my/repo.git

With these filters, issues found in files in the root-level src directory would be reported, unless they had the .classpath or .jmx extension, or if they were found in the src/test/dev/resources/ directory, for example. Additional usage information is provided when calling trufflehog with the -h or --help options.

These features help cut down on noise, and makes the tool easier to shove into a devops pipeline.

Example

Install

pip install truffleHog

Customizing

Custom regexes can be added with the following flag --rules /path/to/rules. This should be a json file of the following format:

{
 "RSA private key": "-----BEGIN EC PRIVATE KEY-----"
}

Things like subdomain enumeration, s3 bucket detection, and other useful regexes highly custom to the situation can be added.

Feel free to also contribute high signal regexes upstream that you think will benefit the community. Things like Azure keys, Twilio keys, Google Compute keys, are welcome, provided a high signal regex can be constructed.

trufflehog's base rule set sources from https://github.com/dxa4481/truffleHogRegexes/blob/master/truffleHogRegexes/regexes.json

How it works

This module will go through the entire commit history of each branch, and check each diff from each commit, and check for secrets. This is both by regex and by entropy. For entropy checks, truffleHog will evaluate the shannon entropy for both the base64 char set and hexidecimal char set for every blob of text greater than 20 characters comprised of those character sets in each diff. If at any point a high entropy string >20 characters is detected, it will print to the screen.

Help

usage: trufflehog [-h] [--json] [--regex] [--rules RULES]
 [--entropy DO_ENTROPY] [--since_commit SINCE_COMMIT]
 [--max_depth MAX_DEPTH]
 git_url
Find secrets hidden in the depths of git.
positional arguments:
 git_url URL for secret searching
optional arguments:
 -h, --help show this help message and exit
 --json Output in JSON
 --regex Enable high signal regex checks
 --rules RULES Ignore default regexes and source from json list file
 --entropy DO_ENTROPY Enable entropy checks
 --since_commit SINCE_COMMIT
 Only scan from a given commit hash
 --max_depth MAX_DEPTH
 The max commit depth to go back when searching for
 secrets
 -i INCLUDE_PATHS_FILE, --include_paths INCLUDE_PATHS_FILE
 File with regular expressions (one per line), at least
 one of which must match a Git object path in order for
 it to be scanned; lines starting with "#" are treated
 as comments and are ignored. If empty or not provided
 (default), all Git object paths are included unless
 otherwise excluded via the --exclude_paths option.
 -x EXCLUDE_PATHS_FILE, --exclude_paths EXCLUDE_PATHS_FILE
 File with regular expressions (one per line), none of
 which may match a Git object path in order for it to
 be scanned; lines starting with "#" are treated as
 comments and are ignored. If empty or not provided
 (default), no Git object paths are excluded unless
 effectively excluded via the --include_paths option.

Wishlist

  • (削除) A way to detect and not scan binary diffs (削除ここまで)
  • (削除) Don't rescan diffs if already looked at in another branch (削除ここまで)
  • (削除) A since commit X feature (削除ここまで)
  • (削除) Print the file affected (削除ここまで)

About

Searches through git repositories for high entropy strings and secrets, digging deep into commit history

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 99.4%
  • Dockerfile 0.6%

AltStyle によって変換されたページ (->オリジナル) /