Getting Started

Getting Started #

Add a Scanner #

TruffleHog Enterprise includes managed Scanners that we host (the Hosted scanner), but you can also add your own self hosted Scanners. If you only wish to use the managed Scanners, you can skip to the next section.

A Scanner scans only sources that are assigned to it. You may wish to use them for different accounts, networks, or regions.

  1. Navigate to Settings -> Scanners and click on the plus button

    Add a Scanner

  2. Give the scanner a name

    Add a Scanner second step

  3. Download the Scanner config

    Download the Scanner config, and keep it in a safe place because it contains the credentials used access TruffleHog and your data! For security and convenience, we recommend storing it in a secret manager and using the built-in schemas for loading it .

    Download the Scanner config

  4. Download the Scanner

    Download the appropriate Scanner for your operating system and architecture. It will automatically run the latest version from your instance, don’t worry about updating it! Alternativey, run the Docker image we publish with: docker run --net=host -v $(pwd)/config.yaml:/tmp/config.yaml -it --rm us-docker.pkg.dev/thog-artifacts/public/scanner:latest scan --config=/tmp/config.yaml

    Download the Scanner

Configuring the Scanners #

The Scanners support sources and notifiers configured in the web app, but also supports local configuration. Credentials provided via local configuration never leave your servers, and can also be used to scan on-premise data.

By default, the downloaded Scanner config will scan all sources that were added to that scanner in the web app.

  • Add sources to scan in the local config If you wish to use the local configuration, see the additional documentation:

    1. Configure the local sources
    2. Configure the local notifiers
  • Add sources and notifiers via the web app:

    1. Navigate to the sources tab and click add

      Add a source

    2. Select the source to be scanned

      There are many supported sources to scan, and new ones added frequently! You can also request NEW development for currently unsupport sources on this page.

      Select the source

    3. Configure how the source should be scanned

      Make sure to select the appropriate Scanner for your source, and only select Verify Secrets if you own the data or are permitted to verify credentials that are found in it.

      Configure the source

    4. Configure notifications

      You can configure notifications similarly to how sources are configured. Email notifications are enabled by default.

      Add a notifier
      Configure a notifier

Run the Scanner #

  • If you’ve provided the configuration as a file, run the scanner with filepath provided

Note, the Windows scanner binary is named scanner.exe.

./scanner scan --config=path/to/config.yaml
🐷🔑🐷 TruffleHog. Unearth your secrets. 🐷🔑🐷
  • If you’ve uploaded the configuration to a secret management solution (recommended), run the scanner with the secret provided as a URI in the format required for the tool. For example, GCP Secrets Manager is specified like this:
./scanner scan --config="gsm://my-gcp-project/secret-name"