Sources are entities that provide data to be scanned. They are configured via a local configuration file, or in the web UI. Examples of sources include: Slack, JIRA, Github, S3, etc.


Notifiers are the integrations for sending notifications for found secrets. Examples of notifiers include: Email, Slack message, JIRA ticket, or a webhook.


Workflows are integrations for driving remediation directly with developers.

Scanners (Agents)

Scanners are the component that scan for secrets and verify them. Metadata of the secret is sent to the configured notifiers and to your hosted web UI. By default, scanners are part of the Hosted scanner group. The Hosted scanner group is run for you in Truffle Security infrastructure in your own isolated environment. Additionally, scanners can be setup to run on your own hardware. These scanners will be placed in an individually created scanner group.

Scanner Group (Agent Group)

Scanner groups are used to manage multiple scanners. You configure scanner groups in the web UI.


Secrets, or more generally credentials, are the data that is scanned for. Examples of secrets include: Access Keys/Tokens, API keys, passwords, etc.

Secret States

  • Live: The secret is verified and is active.
  • Never Live: The secret was never verified as active.
  • Rotated/Deactivated: The secret was verified as live at one point, and has since been verified as not live.
  • All: Any secret that was found.

Triage States

  • Not Triaged: The secret has not been triaged.
  • Invalid: The secret is marked invalid by the user. This could be for any reason. For example, the secret is wrong.
  • Resolved: The secret was marked as resolved by the user. Useful for when the secret was removed before TruffleHog could verify that it is no longer active.
  • Will Not Fix: The secret was marked as will not fix by the user. Common reasons are risk acceptance and canary tokens.