You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Why is the scan taking a long time when I scan a GitHub org
390
390
- Unauthenticated GitHub scans have rate limits. To improve your rate limits, include the `--token` flag with a personal access token
391
391
- It says a private key was verified, what does that mean?
392
-
-Check out our Driftwood blog post to learn how to do this, in short we've confirmed the key can be used live for SSH or SSL [Blog post](https://trufflesecurity.com/blog/driftwood-know-if-private-keys-are-sensitive/)
392
+
-A verified result means TruffleHog confirmed the credential is valid by testing it against the service's API. For private keys, we've confirmed the key can be used live for SSH or SSL authentication. Check out our Driftwood blog post to learn more[Blog post](https://trufflesecurity.com/blog/driftwood-know-if-private-keys-are-sensitive/)
393
393
- Is there an easy way to ignore specific secrets?
394
394
- If the scanned source [supports line numbers](https://github.com/trufflesecurity/trufflehog/blob/d6375ba92172fd830abb4247cca15e3176448c5d/pkg/engine/engine.go#L358-L365), then you can add a `trufflehog:ignore` comment on the line containing the secret to ignore that secrets.
395
395
@@ -405,7 +405,13 @@ TruffleHog v3 is a complete rewrite in Go with many new powerful features.
405
405
406
406
## What is credential verification?
407
407
408
-
For every potential credential that is detected, we've painstakingly implemented programmatic verification against the API that we think it belongs to. Verification eliminates false positives. For example, the [AWS credential detector](pkg/detectors/aws/aws.go) performs a `GetCallerIdentity` API call against the AWS API to verify if an AWS credential is active.
408
+
For every potential credential that is detected, we've painstakingly implemented programmatic verification against the API that we think it belongs to. Verification eliminates false positives and provides three result statuses:
409
+
410
+
-**verified**: Credential confirmed as valid and active by API testing
411
+
-**unverified**: Credential detected but not confirmed valid (may be invalid, expired, or verification disabled)
412
+
-**unknown**: Verification attempted but failed due to errors, such as a network or API failure
413
+
414
+
For example, the [AWS credential detector](pkg/detectors/aws/aws.go) performs a `GetCallerIdentity` API call against the AWS API to verify if an AWS credential is active.
409
415
410
416
# :memo: Usage
411
417
@@ -444,7 +450,7 @@ Flags:
444
450
--github-actions Output in GitHub Actions format.
445
451
--concurrency=20 Number of concurrent workers.
446
452
--no-verification Don't verify the results.
447
-
--results=RESULTS Specifies which type(s) of results to output: verified, unknown, unverified, filtered_unverified. Defaults to all types.
453
+
--results=RESULTS Specifies which type(s) of results to output: verified (confirmed valid by API), unknown (verification failed due to error), unverified (detected but not verified), filtered_unverified (unverified but would have been filtered out). Defaults to all types.
448
454
--allow-verification-overlap
449
455
Allow verification of similar credentials across detectors
450
456
--filter-unverified Only output first unverified result per chunk per detector if there are more than one results.
@@ -677,7 +683,7 @@ webhook is used containing the regular expression matches.
677
683
678
684
TruffleHog will send a JSON POST request containing the regex matches to a
679
685
configured webhook endpoint. If the endpoint responds with a `200 OK` response
680
-
status code, the secret is considered verified.
686
+
status code, the secret is considered verified. If verification fails due to network/API errors, the result is marked as unknown.
681
687
682
688
Custom Detectors support a few different filtering mechanisms: entropy, regex targeting the entire match, regex targeting the captured secret,
683
689
and excluded word lists checked against the secret (captured group if present, entire match if capture group is not present). Note that if
results=cli.Flag("results", "Specifies which type(s) of results to output: verified, unknown, unverified, filtered_unverified. Defaults to verified,unverified,unknown.").String()
61
+
results=cli.Flag("results", "Specifies which type(s) of results to output: verified (confirmed valid by API), unknown (verification failed due to error), unverified (detected but not verified), filtered_unverified (unverified but would have been filtered out). Defaults to verified,unverified,unknown.").String()
0 commit comments