Map your GCP key's permissions and reach

Remediate faster with more context.

How it works

End-to-end contextual triage

Instantly connect a specific leaked service account key string to its current, accessible resources and effective permissions.

Hierarchical access mapping

Utilize a dedicated permissions viewer and graph view to map the service account's access across the entire GCP resource hierarchy—including inheritance from the organization, folder, and project levels—to reveal complex access patterns.

Prioritized remediation

Immediately prioritize incident response by focusing security teams exclusively on NHI and their secrets with the broadest access (e.g., resources or folder-level roles) and most damaging permissions.

Actionable least privilege guidance

Pinpoint and correct long-term risk by identifying over-privileged roles and those with misleading names assigned to a NHI, providing guidance to right-size credentials.

Accelerated incident response

Expedite threat containment by providing a direct link to the GCP console for immediate key rotation, enabling security teams to scope the incident and act in minutes instead of hours.

Take control of your secrets with TruffleHog

Contact us to protect your data across the entire SDLC

Get started

Take control of your secrets with TruffleHog

Contact us to protect your data across the entire SDLC

Get started

The Dig

Thoughts, research findings, reports, and more from Truffle Security Co.