Unearth your secrets

TruffleHog™ uncovers exposed non-human identities (NHIs) and their secrets, securing everything from open-source projects to global enterprises.

Trusted by dev and security TEAMS at some of the most innovative companies
Trusted by dev and security TEAMS at some of the most innovative companies

Millions of leaked secrets

Millions NHIs and its secrets, including API keys, passwords, and tokens, are frequently leaking from sources like source code, chat systems, support tickets, and more, underscoring the need for robust secret leak detection.

TruffleHog digs deep

TruffleHog scans for sensitive credentials beyond the source code to include hidden content, deleted code, and version history from GitHub, Google Cloud, Slack, and more commonly used tools across your company.

Secrets detection

Secrets detection

TruffleHog sniffs out secrets everywhere: even the nooks and crannies of your GitHub comments and pull requests. TruffleHog supports the most complete list of integrations to scan across your entire SDLC.

TruffleHog sniffs out secrets everywhere: even the nooks and crannies of your GitHub comments and pull requests. TruffleHog supports the most complete list of integrations to scan across your entire SDLC.

Secrets verification

Secrets verification

TruffleHog scans 800+ credential types, directly verified with key providers for unmatched scan accuracy - unearthing exposed, live, at-risk secrets.

TruffleHog scans 800+ credential types, directly verified with key providers for unmatched scan accuracy - unearthing exposed, live, at-risk secrets.

In-depth analysis

In-depth analysis

TruffleHog Analyze automatically identifies the resources and permissions associated with NHIs, API key and other secrets without requiring access to a provider’s UI, reducing time to remediation.

TruffleHog Analyze automatically identifies the resources and permissions associated with NHIs, API key and other secrets without requiring access to a provider’s UI, reducing time to remediation.

Continuous monitoring

Continuous monitoring

TruffleHog continuously tracks the status of all key types to identify whether remediation has occurred. Set up alerts across the platform of your choosing and include customized messages for developers to rotate and secure keys.

TruffleHog continuously tracks the status of all key types to identify whether remediation has occurred. Set up alerts across the platform of your choosing and include customized messages for developers to rotate and secure keys.

Shift left

Shift left

With TruffleHog, security teams can make it easier for developers to revoke leaked secrets by providing them with an automatic process. Each fix is automatically reverified, giving security teams confidence that problems are resolved for good.

With TruffleHog, security teams can make it easier for developers to revoke leaked secrets by providing them with an automatic process. Each fix is automatically reverified, giving security teams confidence that problems are resolved for good.

Over 250K daily runs by developers and security teams

With over 250,000 daily runs and 23,000 GitHub stars, TruffleHog is relied on by thousands of developers and security teams every day.

TruffleHog Enterprise extends that same trusted engine with enterprise-grade visibility, verification, and collaboration tools to help teams manage NHI and their secrets.

250K+

Daily runs

23K+

GitHub stars

Gett rides with TruffleHog to automate secrets detection and remediation

"TruffleHog was the only tool we looked at that could go beyond simply detecting the secret. TruffleHog validates whether or not it was a live key or false positive and isolates where the secrets are in the code. This information is automatically pushed to the developer so they can pinpoint and address the issue."

Andy Pannell, Application Security Lead

Find out how Gett leveraged TruffleHog to identify and address leaked secrets with minimal strain on internal resources.

Read the case study

Gett rides with TruffleHog to automate secrets detection and remediation

"TruffleHog was the only tool we looked at that could go beyond simply detecting the secret. TruffleHog validates whether or not it was a live key or false positive and isolates where the secrets are in the code. This information is automatically pushed to the developer so they can pinpoint and address the issue."

Andy Pannell, Application Security Lead

Find out how Gett leveraged TruffleHog to identify and address leaked secrets with minimal strain on internal resources.

Read the case study

The Dig

Thoughts, research findings, reports, and more from Truffle Security Co.