Join us

ContentUpdates from Truffle Security...
 Activity
@kaptain added a new tool Hadolint , 2 weeks, 6 days ago.
 Activity
@varbear added a new tool Bandit , 2 weeks, 6 days ago.
 Activity
@devopslinks added a new tool JFrog Xray , 2 weeks, 6 days ago.
 Activity
@devopslinks added a new tool OWASP Dependency-Check , 2 weeks, 6 days ago.
 Activity
@varbear added a new tool pre-commit , 2 weeks, 6 days ago.
 Activity
@devopslinks added a new tool GitGuardian , 2 weeks, 6 days ago.
 Activity
@devopslinks added a new tool detect-secrets , 2 weeks, 6 days ago.
 Activity
@devopslinks added a new tool Gitleaks , 2 weeks, 6 days ago.
Course
@eon01 published a course, 3 weeks ago
Founder, FAUN.dev

DevSecOps in Practice

TruffleHog Flask NeuVector detect-secrets pre-commit OWASP Dependency-Check Docker checkov Bandit Hadolint Grype KubeLinter Syft GitLab CI/CD Trivy Kubernetes

A Hands-On Guide to Operationalizing DevSecOps at Scale

DevSecOps in Practice
Story
@tairascott shared a post, 3 weeks ago
AI Expert and Consultant, Trigma

How Do Large Language Models (LLMs) Work? An In-Depth Look

Discover how Large Language Models work through a clear and human centered explanation. Learn about training, reasoning, and real world applications including Agentic AI development and LLM powered solutions from Trigma.

How do Large Language Models (LLMs) Work Banner
Truffle Security is the company behind TruffleHog, one of the most widely used open-source tools for discovering leaked secrets in code repositories, cloud environments, and developer infrastructure. The company focuses on securing the modern software supply chain by detecting exposed credentials early, validating them with high accuracy, and providing actionable remediation workflows.

Their platform supports large-scale scanning across GitHub, GitLab, Bitbucket, CI/CD systems, and enterprise codebases, with specialized products for continuous monitoring and automated alerting. Truffle Security works closely with security researchers and enterprises to reduce the risk of account takeovers, data breaches, and supply chain attacks driven by credential leakage. The company also invests in security research programs that uncover real-world vulnerabilities across open-source ecosystems.