Join us

ContentUpdates and recent posts about TruffleHog..
ย Activity
@aliasceasar026 started using tool Crypto-Loot , 3ย weeks, 2ย days ago.
ย Activity
@tonybrain-dotcom started using tool Vue.js , 3ย weeks, 3ย days ago.
Story
@idjuric660 shared a post, 3ย weeks, 3ย days ago
Technical Content Writer, Mailtrap

5 Best Email API for PHP Developers Tested & Compared: Hereโ€™s What I Found

The best email APIs for PHP developers are Mailtrap, SendGrid, Mailgun, Amazon SES, and Postmark. I researched and tested each of these services with the help of Mailtrapโ€™s deliverability experts and security team. My goal was to identifythe best email APIs for PHP projectsby looking at real-world i..

Story
@laura_garcia shared a post, 3ย weeks, 3ย days ago
Software Developer, RELIANOID

AI-driven cyberthreats previsions

At the end of last year, we warned that AI-driven cyberthreats would accelerate industrial risk in 2026. Just a few months into the year, that prediction is already proving accurate. Weโ€™re seeing clear signals that attackers are increasingly leveraging Artificial Intelligence to: - Automate reconnai..

Story
@laura_garcia shared a post, 3ย weeks, 4ย days ago
Software Developer, RELIANOID

๐—ก๐—œ๐—ฆ๐Ÿฎ ๐—–๐—ผ๐—บ๐—ฝ๐—น๐—ถ๐—ฎ๐—ป๐—ฐ๐—ฒ ๐—ฆ๐˜๐—ฎ๐˜๐—ฒ๐—บ๐—ฒ๐—ป๐˜

Alignment for RELIANOID Load Balancer & Organizational Operations At RELIANOID, we recognize the strategic importance of the EU NIS2 Directive in strengthening cybersecurity resilience across Europe. As an advanced load balancing and application delivery provider, RELIANOID qualifies as an Important..

nis2 compliance RELIANOID
ย Activity
@craitrix created an organization Craitrix , 3ย weeks, 4ย days ago.
Story
@laura_garcia shared a post, 3ย weeks, 5ย days ago
Software Developer, RELIANOID

๐—–๐—น๐—ผ๐˜‚๐—ฑ ๐—ฃ๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—ฒ๐—ฟ (๐—™๐˜‚๐—น๐—น-๐˜๐—ถ๐—บ๐—ฒ | ๐—ฅ๐—ฒ๐—บ๐—ผ๐˜๐—ฒ / ๐—›๐˜†๐—ฏ๐—ฟ๐—ถ๐—ฑ)

๐Ÿš€ ๐—ช๐—ฒโ€™๐—ฟ๐—ฒ ๐—›๐—ถ๐—ฟ๐—ถ๐—ป๐—ด: ๐—–๐—น๐—ผ๐˜‚๐—ฑ ๐—ฃ๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—ฒ๐—ฟ (๐—™๐˜‚๐—น๐—น-๐˜๐—ถ๐—บ๐—ฒ | ๐—ฅ๐—ฒ๐—บ๐—ผ๐˜๐—ฒ / ๐—›๐˜†๐—ฏ๐—ฟ๐—ถ๐—ฑ) At RELIANOID, weโ€™re accelerating the evolution of our cloud-native solutions โ€” and we need talented engineers to join us. Weโ€™re looking for ๐Ÿฎ ๐—–๐—น๐—ผ๐˜‚๐—ฑ ๐—ฃ๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—ฒ๐—ฟ๐˜€ to join our Product Engineering team and help shape the future ..

careers RELIANOID hiring
Link
@devopslinks shared a link, 3ย weeks, 5ย days ago
FAUN.dev()

The hunt for truly zero-CVE container images

Chainguard's Factory 2.0 andDriftlessAFrebuild images from source on upstream changes. They produce 2,000+ minimalzeroโ€‘CVEimages. Each image includes anSBOMand a cryptographicsignature. Docker'sDHIbuilds onDebianandAlpine. It mirrors Debian'snoโ€‘DSAtriage intoVEX. It also suppresses real CVEs until D.. read more ย 

Link
@devopslinks shared a link, 3ย weeks, 5ย days ago
FAUN.dev()

Chinese Vulnerability Database: CNVD vs CNNVD Analysis

Investigation profilesCNNVDandCNVDechoCVE. They reveal manual errors and poor machine-readability. Chinaโ€™s July 2021RMSVmandates 48-hour reporting and bans pre-patch disclosure. Mapping gaps exist. The databases published about1.4kentries ahead ofCVE, with lead times measured in months... read more ย 

Chinese Vulnerability Database: CNVD vs CNNVD Analysis
Link
@devopslinks shared a link, 3ย weeks, 5ย days ago
FAUN.dev()

Please stop externalizing your costs directly into my face

SourceHut spent20โ€“100%of weekly time mitigating hyperโ€‘aggressive LLM crawlers. That work caused dozens of short outages and delayed core projects. The crawlers ignorerobots.txt. They hit costly endpoints likegit blame. They scan full git logs and commits. They rotate randomUserโ€‘Agentsand thousands o.. read more ย 

TruffleHog is a high-accuracy secret-detection tool designed to uncover exposed credentials such as API keys, tokens, private keys, and cloud secrets across large codebases. Originally created to scan Git commit history, it has evolved into a multi-source scanning engine capable of analyzing GitHub, GitLab, Bitbucket, Docker images, file systems, Terraform states, and cloud environments.

The scanner combines entropy detection, an extensive library of regular expression detectors, and live credential validation to minimize false positives. TruffleHog is widely used in security research, supply chain security, DevSecOps workflows, and bug bounty programs. Its speed, accuracy, and broad ecosystem coverage make it a core tool for identifying and preventing credential leakage in modern software development.