Skip to content

Latest commit

 

History

History
192 lines (123 loc) · 4.87 KB

File metadata and controls

192 lines (123 loc) · 4.87 KB

TruffleHog Pre-Commit Hooks

Pre-commit hooks are scripts that run automatically before a commit is completed, allowing you to check your code for issues before sharing it with others. TruffleHog can be integrated as a pre-commit hook to prevent credentials from leaking before they ever leave your computer.

This guide covers how to set up TruffleHog as a pre-commit hook using two popular frameworks:

  1. Git's hooksPath feature - A built-in Git feature for managing hooks globally
  2. Using Pre-commit framework - A language-agnostic framework for managing pre-commit hooks
  3. Using Husky - A Git hooks manager for JavaScript/Node.js projects

Prerequisites

All of the methods require TruffleHog to be installed.

  1. Install TruffleHog:
# Using Homebrew (macOS)
brew install trufflehog

# Using installation script for Linux, macOS, and Windows (and WSL)
curl -sSfL https://raw.githubusercontent.com/trufflesecurity/trufflehog/main/scripts/install.sh | sh -s -- -b /usr/local/bin

Global setup using Git's hooksPath feature

This approach uses Git's core.hooksPath to apply hooks to all repositories without requiring any per-repository setup:

  1. Create a global hooks directory:
mkdir -p ~/.git-hooks
  1. Create a pre-commit hook file:
touch ~/.git-hooks/pre-commit
chmod +x ~/.git-hooks/pre-commit
  1. Add the following content to ~/.git-hooks/pre-commit:
#!/bin/sh

trufflehog git file://. --since-commit HEAD --results=verified,unknown --fail

If you are using Docker, use this instead:

#!/bin/sh

docker run --rm -v "$(pwd):/workdir" -i --rm trufflesecurity/trufflehog:latest git file:///workdir --since-commit HEAD --results=verified,unknown --fail
  1. Configure Git to use this hooks directory globally:
git config --global core.hooksPath ~/.git-hooks

Now all your repositories will automatically use this pre-commit hook without any additional setup.

Using the Pre-commit Framework

The pre-commit framework is a powerful, language-agnostic tool for managing Git hooks.

Installation of Pre-commit

  1. Install the pre-commit framework:
# Using pip (Python)
pip install pre-commit

# Using Homebrew (macOS)
brew install pre-commit

# Using conda
conda install -c conda-forge pre-commit

Repository-Specific Setup

To set up TruffleHog as a pre-commit hook for a specific repository:

  1. Create a .pre-commit-config.yaml file in the root of your repository:
repos:
  - repo: local
    hooks:
      - id: trufflehog
        name: TruffleHog
        description: Detect secrets in your data.
        entry: bash -c 'trufflehog git file://. --since-commit HEAD --results=verified,unknown --fail'
        language: system
        stages: ["pre-commit", "pre-push"]
  1. Install the pre-commit hook:
pre-commit install

Using Husky

Husky is a popular tool for managing Git hooks in JavaScript/Node.js projects.

Installation of Husky

  1. Install Husky in your project:
# npm
npm install husky --save-dev

# yarn
yarn add husky --dev
  1. Enable Git hooks:
# npm
npx husky init

Setting Up TruffleHog with Husky

  1. Add the following content to .husky/pre-commit:
echo "trufflehog git file://. --since-commit HEAD --results=verified,unknown --fail" > .husky/pre-commit
  1. For Docker users, use this content instead:
echo 'docker run --rm -v "$(pwd):/workdir" -i --rm trufflesecurity/trufflehog:latest git file:///workdir --since-commit HEAD --results=verified,unknown --fail' > .husky/pre-commit

Best Practices

Commit Process

For optimal hook efficacy:

  1. Execute git add followed by git commit separately. This ensures TruffleHog analyzes all intended changes.
  2. Avoid using git commit -am, as it might bypass pre-commit hook execution for unstaged modifications.

Skipping Hooks

In rare cases, you may need to bypass pre-commit hooks:

git commit --no-verify -m "Your commit message"

Troubleshooting

Hook Not Running

If your pre-commit hook isn't running:

  1. Ensure the hook is executable:

    chmod +x .git/hooks/pre-commit
  2. Check if hooks are enabled:

    git config --get core.hooksPath

False Positives

If you're getting false positives:

  1. Use the --results=verified flag to only show verified secrets
  2. Add trufflehog:ignore comments on lines with known false positives or risk-accepted findings

Conclusion

By integrating TruffleHog into your pre-commit workflow, you can prevent credential leaks before they happen. Choose the setup method that best fits your project's needs and development workflow.

For more information on TruffleHog's capabilities, refer to the main documentation.