Scanning for Secrets in Docker Images: A Deep Dive
We analyzed 10,000 public Docker Hub images and found credentials in 14% of them.
Security research, credential exposure analysis, and LLM safety findings from the Truffle Security research team.
We analyzed 10,000 public Docker Hub images and found credentials in 14% of them.
Our annual report on credential exposure trends across the software industry.
We systematically mapped the prompt injection attack surface of Gemini 2.5 Pro across 8 input modalities.
A critical RCE vulnerability we discovered in a widely-used CI/CD system.
Architecture deep-dive into how we scan at massive scale.
How long does it take for a leaked AWS key on GitHub to be exploited? We measured it.
We analyzed 200 breaches that originated from credential exposure.
AI coding assistants can be tricked into revealing secrets from their context window.
New techniques for accessing cloud instance metadata through SSRF in modern frameworks.
New GitHub Action and GitLab CI integration for pre-merge secret scanning.
New release adds user-defined detector patterns and a 5x faster regex engine.
Tracking public credential exposure across the Fortune 500 over three years.
Image-embedded prompts bypass text-only safety classifiers in Gemini Pro Vision.
Dangling DNS records enable OAuth token interception in enterprise SSO flows.
TruffleHog's secret verification system is now fully open source.
Terraform state files are one of the most overlooked sources of credential exposure.
Build logs, artifacts, and runner environments are leaking secrets at an alarming rate.
Model Context Protocol tool descriptions can be weaponized to hijack agent behavior.
We identified 147 malicious PyPI packages performing credential theft.
Our large-scale scan of the npm registry reveals widespread credential leakage in published packages.
Engineering deep-dive into TruffleHog's high-performance git scanning engine.
Retrieval-augmented generation systems are vulnerable to document injection attacks.
How the transition to post-quantum cryptography affects secret scanning tools.
A novel container escape technique targeting AWS Lambda's execution environment.
Deleted doesn't mean gone. We explain how TruffleHog recovers secrets from git history.
A new SDK for building organization-specific secret detectors.
We benchmarked 12 LLMs on their willingness to help extract data they shouldn't.