-
Notifications
You must be signed in to change notification settings - Fork 1.8k
Comparing changes
Open a pull request
base repository: trufflesecurity/trufflehog
base: v3.88.2
head repository: trufflesecurity/trufflehog
compare: v3.88.3
- 20 commits
- 795 files changed
- 10 contributors
Commits on Jan 9, 2025
-
[chore] Use static token in GitHub source (#3834)
Also some minor formatting in sources.go
Configuration menu - View commit details
-
Copy full SHA for fbf835f - Browse repository at this point
Copy the full SHA fbf835fView commit details
Commits on Jan 10, 2025
-
Update log for large s3 file (#3835)
* update log for large s3 file * key and size already in ctx
Configuration menu - View commit details
-
Copy full SHA for 81d5859 - Browse repository at this point
Copy the full SHA 81d5859View commit details -
Configuration menu - View commit details
-
Copy full SHA for 6d1c59f - Browse repository at this point
Copy the full SHA 6d1c59fView commit details
Commits on Jan 13, 2025
-
Support for Customize Endpoint in Gitlab Analyzer (#3832)
* pass on host to gitlab analyzer from detector * remove version from metadata as that causes the test to fail * reverted the cli to old one. code refactoring
Configuration menu - View commit details
-
Copy full SHA for e967efa - Browse repository at this point
Copy the full SHA e967efaView commit details -
Configuration menu - View commit details
-
Copy full SHA for 71b341c - Browse repository at this point
Copy the full SHA 71b341cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 44fc4c8 - Browse repository at this point
Copy the full SHA 44fc4c8View commit details
Commits on Jan 14, 2025
-
Run detector tests from test workflow #3839
#3773 missed one
Configuration menu - View commit details
-
Copy full SHA for 1571f92 - Browse repository at this point
Copy the full SHA 1571f92View commit details -
issue:3838 - fixed common email pattern (#3840)
* issue:3838 - fixed common email pattern * updated pattern as suggested by rgmz Co-authored-by: Richard Gomez <32133502+rgmz@users.noreply.github.com> --------- Co-authored-by: Richard Gomez <32133502+rgmz@users.noreply.github.com>
Configuration menu - View commit details
-
Copy full SHA for ea62086 - Browse repository at this point
Copy the full SHA ea62086View commit details -
Configuration menu - View commit details
-
Copy full SHA for 9e28c7a - Browse repository at this point
Copy the full SHA 9e28c7aView commit details
Commits on Jan 15, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 3370e4f - Browse repository at this point
Copy the full SHA 3370e4fView commit details -
feat(uri): update detector (#3656)
The URI detector currently makes an indiscriminate number of HTTP requests to domains, regardless of whether they actually exist. This results in wasted network bandwidth and logs spammed with things like below: Found unverified result 🐷🔑❓ Verification issue: lookup proxy.example.com: no such host Detector Type: URI Decoder Type: PLAIN Raw result: http://username:password@proxy.example.com Commit: 0dec3cdfe8cbd1c7fd6b5bdd3d8f108d4cc42311 Email: Toan <toan@microsoft.com> File: reactjs.zip Line: 127 Link: https://github.com/azureossd/Deployment-Oryx-Samples/blob/0dec3cdfe8cbd1c7fd6b5bdd3d8f108d4cc42311/reactjs.zip#L127 Repository: https://github.com/azureossd/Deployment-Oryx-Samples.git Timestamp: 2020-04-23 01:20:33 +0000 In addition to de-duplicating matches, this updates the URI detector to track hosts that are not found and skip verification.
Configuration menu - View commit details
-
Copy full SHA for 278251a - Browse repository at this point
Copy the full SHA 278251aView commit details -
Configuration menu - View commit details
-
Copy full SHA for 8723f85 - Browse repository at this point
Copy the full SHA 8723f85View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1a1fe7b - Browse repository at this point
Copy the full SHA 1a1fe7bView commit details -
Configuration menu - View commit details
-
Copy full SHA for eea7e06 - Browse repository at this point
Copy the full SHA eea7e06View commit details
Commits on Jan 16, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 1fc8961 - Browse repository at this point
Copy the full SHA 1fc8961View commit details
Commits on Jan 20, 2025
-
fixed sentry auth token detector (#3827)
* fixed sentry auth token detector * not sure why this is failing * Updated http client logic Co-authored-by: Richard Gomez <32133502+rgmz@users.noreply.github.com> * resolved comments * improved decoding logic * removed response type * splitted to two versions * splitted to two versions * this is confusing error --------- Co-authored-by: Richard Gomez <32133502+rgmz@users.noreply.github.com>
Configuration menu - View commit details
-
Copy full SHA for 39d2453 - Browse repository at this point
Copy the full SHA 39d2453View commit details
Commits on Jan 21, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 20a3840 - Browse repository at this point
Copy the full SHA 20a3840View commit details
Commits on Jan 24, 2025
-
Configuration menu - View commit details
-
Copy full SHA for 7550057 - Browse repository at this point
Copy the full SHA 7550057View commit details
Commits on Jan 27, 2025
-
update jenkins err message (#3855)
This PR updates an error message to be more helpful.
Configuration menu - View commit details
-
Copy full SHA for d509097 - Browse repository at this point
Copy the full SHA d509097View commit details
Commits on Jan 28, 2025
-
[Fix] use unrestricted http client only for non-safe requests (#3847)
* exposed a MethodIsSafe() to reuse it in OpsGenie Analyzer. Use Restricted Client for non-safe APIs. * Renamed MethodIsSafe to IsMethodSafe for more clarity
Configuration menu - View commit details
-
Copy full SHA for b6b00bb - Browse repository at this point
Copy the full SHA b6b00bbView commit details
There are no files selected for viewing