Join us

ContentUpdates from Truffle Security...
 Activity
@human_in_growth started using tool Rust , 4 days, 11 hours ago.
 Activity
@human_in_growth started using tool Ruby , 4 days, 11 hours ago.
 Activity
@human_in_growth started using tool Prometheus , 4 days, 11 hours ago.
 Activity
@human_in_growth started using tool PostgreSQL , 4 days, 11 hours ago.
 Activity
@human_in_growth started using tool Node.js , 4 days, 11 hours ago.
 Activity
@human_in_growth started using tool Grafana , 4 days, 11 hours ago.
 Activity
@human_in_growth started using tool Go , 4 days, 11 hours ago.
 Activity
@human_in_growth started using tool Docker , 4 days, 11 hours ago.
Story FAUN.dev() Team Trending
@eon01 shared a post, 4 days, 18 hours ago
Founder, FAUN.dev

Helm Cheat Sheet: Everything You Need to Know to Start Using Helm

Helm Kubernetes

Helm is the package manager Kubernetes was missing. It lets you package applications and their dependencies into charts, deploy them as versioned releases, and manage installs, upgrades, and rollbacks in a consistent and repeatable way. This post walks through what Helm is, how to install it, and the core commands you will use day to day.

 Activity
@varbear added a new tool Git , 4 days, 22 hours ago.
Truffle Security is the company behind TruffleHog, one of the most widely used open-source tools for discovering leaked secrets in code repositories, cloud environments, and developer infrastructure. The company focuses on securing the modern software supply chain by detecting exposed credentials early, validating them with high accuracy, and providing actionable remediation workflows.

Their platform supports large-scale scanning across GitHub, GitLab, Bitbucket, CI/CD systems, and enterprise codebases, with specialized products for continuous monitoring and automated alerting. Truffle Security works closely with security researchers and enterprises to reduce the risk of account takeovers, data breaches, and supply chain attacks driven by credential leakage. The company also invests in security research programs that uncover real-world vulnerabilities across open-source ecosystems.