TRUFFLEHOG

Analyze

Analyze

Understand the impact of your secrets

Exposed secrets are IAM security risks, not just static code issues.

It all starts by asking the right questions

It all starts by asking the right questions

Who created the secret?

Often, the person who leaked the secret isn't the one who created it.

TruffleHog Analyze identifies the secret's creator, helping teams understand ownership and streamline the rotation or revocation process. 

What resources can the secret access?

Understanding the scope of access is crucial for assessing the impact of a leak.

TruffleHog Analyze maps out every resource the secret can access, from repositories to cloud services.

What permissions does the secret have?

Not all access is created equal.

TruffleHog Analyze enumerates the secret's permissions on each resource, distinguishing between read, write, and admin-level access.

How can I rotate or revoke the secret?

TruffleHog provides clear step-by-step guides and direct links tailored to each provider, enabling quick and efficient secret rotation or revocation.

Simplified credential analysis

With TruffleHog Analyze, all the metadata, resources, and permissions are self-discovered directly from the secret without you needing to setup yet another integration.

20+ key types supported and growing

TruffleHog Analyze supports more than 20 of the most frequently leaked secret types, with more added regularly.

Join us in expanding coverage across the 800+ secret types TruffleHog detects.

Take control of your secrets with TruffleHog

Contact us to protect your data across the entire SDLC

Get started

Take control of your secrets with TruffleHog

Contact us to protect your data across the entire SDLC

Get started

The Dig

Thoughts, research findings, reports, and more from Truffle Security Co.