<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://trufflesecurity.com/</loc></url>
<url><loc>https://trufflesecurity.com/trufflehog-analyze</loc></url>
<url><loc>https://trufflesecurity.com/trufflehog-gcp-analyze</loc></url>
<url><loc>https://trufflesecurity.com/trufflehog-forager</loc></url>
<url><loc>https://trufflesecurity.com/integrations</loc></url>
<url><loc>https://trufflesecurity.com/branding</loc></url>
<url><loc>https://trufflesecurity.com/careers</loc></url>
<url><loc>https://trufflesecurity.com/events</loc></url>
<url><loc>https://trufflesecurity.com/faq</loc></url>
<url><loc>https://trufflesecurity.com/cfp</loc></url>
<url><loc>https://trufflesecurity.com/videos</loc></url>
<url><loc>https://trufflesecurity.com/library</loc></url>
<url><loc>https://trufflesecurity.com/about</loc></url>
<url><loc>https://trufflesecurity.com/detectors</loc></url>
<url><loc>https://trufflesecurity.com/analyzers</loc></url>
<url><loc>https://trufflesecurity.com/trufflehog-enterprise</loc></url>
<url><loc>https://trufflesecurity.com/customers</loc></url>
<url><loc>https://trufflesecurity.com/security</loc></url>
<url><loc>https://trufflesecurity.com/pricing</loc></url>
<url><loc>https://trufflesecurity.com/trufflehog</loc></url>
<url><loc>https://trufflesecurity.com/newsletter</loc></url>
<url><loc>https://trufflesecurity.com/blog</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen</loc></url>
<url><loc>https://trufflesecurity.com/privacy-policy</loc></url>
<url><loc>https://trufflesecurity.com/burdens-magnolia-learner-dart</loc></url>
<url><loc>https://trufflesecurity.com/press</loc></url>
<url><loc>https://trufflesecurity.com/contact</loc></url>
<url><loc>https://trufflesecurity.com/partners</loc></url>
<url><loc>https://trufflesecurity.com/partners/deal-registration</loc></url>
<url><loc>https://trufflesecurity.com/partners/partner-application</loc></url>
<url><loc>https://trufflesecurity.com/contact-backup-1-28-2025/try-again</loc></url>
<url><loc>https://trufflesecurity.com/library/guides/7-best-practices</loc></url>
<url><loc>https://trufflesecurity.com/webinars/understanding-canaries</loc></url>
<url><loc>https://trufflesecurity.com/webinars/how-to-rotate</loc></url>
<url><loc>https://trufflesecurity.com/webinars/postman-leaks-secrets</loc></url>
<url><loc>https://trufflesecurity.com/webinars/hidden-secrets-github</loc></url>
<url><loc>https://trufflesecurity.com/webinars/from-leak-to-impact-mapping-access-risk-in-gcp</loc></url>
<url><loc>https://trufflesecurity.com/webinars/where-are-your-aws-keys-hiding</loc></url>
<url><loc>https://trufflesecurity.com/webinars/why-developers-fail-to-remediate-leaked-secrets</loc></url>
<url><loc>https://trufflesecurity.com/press/trufflehog-analyze</loc></url>
<url><loc>https://trufflesecurity.com/press/series-b</loc></url>
<url><loc>https://trufflesecurity.com/data-processing-agreement</loc></url>
<url><loc>https://trufflesecurity.com/terms-conditions</loc></url>
<url><loc>https://trufflesecurity.com/scoping</loc></url>
<url><loc>https://trufflesecurity.com/acceptable-use-policy</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/how-do-i-find-the-owner-of-a-mailgun-api-key</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/how-do-i-find-the-owner-of-a-mailchimp-api-key</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/how-do-i-find-the-owner-of-a-hugging-face-api-key</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/how-do-i-find-the-owner-of-a-gitlab-personal-access-token</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/how-do-i-find-the-owner-of-a-github-token</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/how-do-i-find-the-owner-of-a-bitbucket-api-key</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/how-do-i-find-the-owner-of-an-airbrake-api-key</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/how-do-i-find-the-owner-of-an-asana-api-key</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/how-do-i-find-the-owner-of-an-openai-api-key</loc></url>
<url><loc>https://trufflesecurity.com/the-kitchen/scanning-github-with-trufflehog-v3</loc></url>
<url><loc>https://trufflesecurity.com/blog/contributor-spotlight-strengthening-trufflehog-ssrf-protections</loc></url>
<url><loc>https://trufflesecurity.com/blog/claude-tried-to-hack-30-companies-nobody-asked-it-to</loc></url>
<url><loc>https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-now-detects-jwts-with-public-key-signatures-and-verifies-them-for-liveness</loc></url>
<url><loc>https://trufflesecurity.com/blog/the-rise-of-api-worms</loc></url>
<url><loc>https://trufflesecurity.com/blog/scanning-5-6-million-public-gitlab-repositories-for-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/scanning-2-6-million-public-bitbucket-cloud-repositories-for-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/we-ve-been-doing-nhi-since-2015</loc></url>
<url><loc>https://trufflesecurity.com/blog/contributor-spotlight-adam-reiser-of-cisco-talos</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-in-your-log</loc></url>
<url><loc>https://trufflesecurity.com/blog/detecting-exposed-secrets-in-salesforce-with-trufflehog</loc></url>
<url><loc>https://trufflesecurity.com/blog/guest-post-gcp-cloudquarry-searching-for-secrets-in-public-gcp-images</loc></url>
<url><loc>https://trufflesecurity.com/blog/how-to-scan-force-pushed-commits-for-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/this-is-how-you-build-an-ai-ransomware-worm</loc></url>
<url><loc>https://trufflesecurity.com/blog/introducing-trufflehog-s-burp-suite-extension-a-techical-deep-dive</loc></url>
<url><loc>https://trufflesecurity.com/blog/research-finds-12-000-live-api-keys-and-passwords-in-deepseek-s-training-data</loc></url>
<url><loc>https://trufflesecurity.com/blog/removing-jeff-bezos-from-my-bed</loc></url>
<url><loc>https://trufflesecurity.com/blog/under-the-hood-the-algorithmic-power-behind-trufflehog-s-secret-scanning-(part-1-of-2)</loc></url>
<url><loc>https://trufflesecurity.com/blog/millions-at-risk-due-to-google-s-oauth-flaw</loc></url>
<url><loc>https://trufflesecurity.com/blog/vigilante-justice-on-github</loc></url>
<url><loc>https://trufflesecurity.com/blog/mishandled-oauth-tokens-open-backdoors</loc></url>
<url><loc>https://trufflesecurity.com/blog/llms-are-teaching-developers-to-hardcode-api-keys</loc></url>
<url><loc>https://trufflesecurity.com/blog/cracking-open-apk-files-at-scale</loc></url>
<url><loc>https://trufflesecurity.com/blog/announcing-the-winners-of-the-trufflehog-hacktoberfest-2024-detector-competition</loc></url>
<url><loc>https://trufflesecurity.com/blog/7-spooky-places-your-secrets-leak-online</loc></url>
<url><loc>https://trufflesecurity.com/blog/10-of-tls-certificates-reuse-private-keys</loc></url>
<url><loc>https://trufflesecurity.com/blog/secret-scanning-encoded-and-archived-data</loc></url>
<url><loc>https://trufflesecurity.com/blog/securely-open-sourcing-on-github</loc></url>
<url><loc>https://trufflesecurity.com/blog/hacktoberfest-2024-detector-improvement-competition-at-truffle-security</loc></url>
<url><loc>https://trufflesecurity.com/blog/announcing-truffle-security-cfp</loc></url>
<url><loc>https://trufflesecurity.com/blog/8-must-see-talks-at-owasp-2024-global-appsec</loc></url>
<url><loc>https://trufflesecurity.com/blog/you-can-access-private-azure-devops-repo-data</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-partners-with-hugging-face-to-scan-for-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/why-trufflehog-analyze-is-a-game-changer-for-security-teams</loc></url>
<url><loc>https://trufflesecurity.com/blog/contributor-spotlight-karan-bamal</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-now-analyzes-permissions-of-api-keys-and-passwords</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-now-finds-all-deleted-and-private-commits-on-github</loc></url>
<url><loc>https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github</loc></url>
<url><loc>https://trufflesecurity.com/blog/secrets-are-not-a-code-security-problem</loc></url>
<url><loc>https://trufflesecurity.com/blog/leaked-secrets-in-public-jenkins-logs</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-scans-deleted-git-branches</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-now-scans-jenkins-logs</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-partnering-with-elastic-to-scan-for-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/11-000-github-users-ssh-keys-are-too-weak</loc></url>
<url><loc>https://trufflesecurity.com/blog/credentials-leaking-with-subdomain-takeover</loc></url>
<url><loc>https://trufflesecurity.com/blog/stop-recommending-jwts</loc></url>
<url><loc>https://trufflesecurity.com/blog/bug-bounty-hunting-leaked-credentials</loc></url>
<url><loc>https://trufflesecurity.com/blog/scan-postman-for-secrets-with-trufflehog</loc></url>
<url><loc>https://trufflesecurity.com/blog/postman-carries-lots-of-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/do-secrets-leak-on-public-github-gists-in-2024</loc></url>
<url><loc>https://trufflesecurity.com/blog/scan-every-tag-and-architecture-of-a-docker-image-for-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/how-to-scan-jira-for-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/the-keyboard-button-that-displays-linux-root-memory</loc></url>
<url><loc>https://trufflesecurity.com/blog/contributor-spotlight-helena-rosenzweig-and-assetnote-team</loc></url>
<url><loc>https://trufflesecurity.com/blog/how-trufflehog-verifies-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/canaries</loc></url>
<url><loc>https://trufflesecurity.com/blog/how-to-scan-s3-buckets-for-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/how-to-scan-azure-blobs-for-secrets-in-2024</loc></url>
<url><loc>https://trufflesecurity.com/blog/scanning-git-for-secrets-the-2024-comprehensive-guide</loc></url>
<url><loc>https://trufflesecurity.com/blog/the-risks-of-a-leaked-stripe-api-key</loc></url>
<url><loc>https://trufflesecurity.com/blog/identify-slack-workspace-names-from-webhook-urls</loc></url>
<url><loc>https://trufflesecurity.com/blog/most-publicly-leaked-keys-are-never-revoked</loc></url>
<url><loc>https://trufflesecurity.com/blog/research-uncovers-aws-account-numbers-hidden-in-access-keys</loc></url>
<url><loc>https://trufflesecurity.com/blog/google-oauth-is-broken-sort-of</loc></url>
<url><loc>https://trufflesecurity.com/blog/why-did-1-github-repo-leak-5000-live-gcp-keys</loc></url>
<url><loc>https://trufflesecurity.com/blog/running-trufflehog-in-travis-ci</loc></url>
<url><loc>https://trufflesecurity.com/blog/improving-trufflehog-part-i-adding-a-new-detector</loc></url>
<url><loc>https://trufflesecurity.com/blog/announcing-the-trufflehog-hacktoberfest-2023-winners</loc></url>
<url><loc>https://trufflesecurity.com/blog/tailscale-truffle-a-blueprint-for-open-source-trufflehog-contributions</loc></url>
<url><loc>https://trufflesecurity.com/blog/mirror-mirror-on-the-wall-secrets-leaked-from-repos-all</loc></url>
<url><loc>https://trufflesecurity.com/blog/contributor-spotlight-richard-gomez</loc></url>
<url><loc>https://trufflesecurity.com/blog/hacktoberfest</loc></url>
<url><loc>https://trufflesecurity.com/blog/thousands-of-github-comments-leak-live-api-keys</loc></url>
<url><loc>https://trufflesecurity.com/blog/how-to-rotate-key-rotation-tutorials</loc></url>
<url><loc>https://trufflesecurity.com/blog/how-secrets-leak-out-of-docker-images</loc></url>
<url><loc>https://trufflesecurity.com/blog/4500-of-the-top-1-million-websites-leaked-source-code-secrets</loc></url>
<url><loc>https://trufflesecurity.com/blog/do-pre-commit-hooks-prevent-secrets-leakage</loc></url>
<url><loc>https://trufflesecurity.com/blog/running-trufflehog-in-azure-pipelines</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-commands-git-vs-filesystem</loc></url>
<url><loc>https://trufflesecurity.com/blog/travis-leaking-secrets-in-2023</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-tui</loc></url>
<url><loc>https://trufflesecurity.com/blog/discovering-a-vulnerability-in-forager-authz-hours-before-public-launch</loc></url>
<url><loc>https://trufflesecurity.com/blog/remediate-leaked-api-keys-with-key-rotation</loc></url>
<url><loc>https://trufflesecurity.com/blog/secrets-leak-in-ci-cd</loc></url>
<url><loc>https://trufflesecurity.com/blog/introducing-forager</loc></url>
<url><loc>https://trufflesecurity.com/blog/running-trufflehog-in-a-github-action</loc></url>
<url><loc>https://trufflesecurity.com/blog/making-trufflehog-faster-with-aho-corasick</loc></url>
<url><loc>https://trufflesecurity.com/blog/secure-credential-storage-in-2023</loc></url>
<url><loc>https://trufflesecurity.com/blog/xsshunter</loc></url>
<url><loc>https://trufflesecurity.com/blog/protecting-cloud-sql-data-with-cloudsql-exporter</loc></url>
<url><loc>https://trufflesecurity.com/blog/scanning-circleci</loc></url>
<url><loc>https://trufflesecurity.com/blog/of-cors</loc></url>
<url><loc>https://trufflesecurity.com/blog/email-graffiti</loc></url>
<url><loc>https://trufflesecurity.com/blog/its-impossible-to-find-every-vulnerability-so-we-dont-try-to</loc></url>
<url><loc>https://trufflesecurity.com/blog/introducing-trufflehog-v3</loc></url>
<url><loc>https://trufflesecurity.com/blog/driftwood</loc></url>
<url><loc>https://trufflesecurity.com/blog/the-breach-they-kept-secret-2</loc></url>
<url><loc>https://trufflesecurity.com/blog/truffle-security-raises-14-million-series-a-led-by-a16z</loc></url>
<url><loc>https://trufflesecurity.com/blog/trufflehog-the-chrome-extension</loc></url>
<url><loc>https://trufflesecurity.com/blog/why-isnt-xss-used-more-in-the-wild</loc></url>
<url><loc>https://trufflesecurity.com/blog/a-leaky-key-that-led-to-jail-time</loc></url>
<url><loc>https://trufflesecurity.com/blog/ubers-wild-story-of-leaky-keys</loc></url>
<url><loc>https://trufflesecurity.com/blog/leaked-code-leads-to-leaked-keys</loc></url>
<url><loc>https://trufflesecurity.com/blog/remediating-trufflehog-findings-with-doppler</loc></url>
<url><loc>https://trufflesecurity.com/blog/an-api-worm-in-the-making-thousands-of-secrets-found-in-open-s3-buckets</loc></url>
</urlset>