Scanning for Secrets in Docker Images: A Deep Dive
We analyzed 10,000 public Docker Hub images and found credentials in 14% of them.
We analyzed 10,000 public Docker Hub images and found credentials in 14% of them.
How long does it take for a leaked AWS key on GitHub to be exploited? We measured it.
New release adds user-defined detector patterns and a 5x faster regex engine.
Terraform state files are one of the most overlooked sources of credential exposure.
Our large-scale scan of the npm registry reveals widespread credential leakage in published packages.
Deleted doesn't mean gone. We explain how TruffleHog recovers secrets from git history.