-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: Ability to specify a list of files (with wildcard match) to ignore #8
Comments
We have this same need with regard to SSIS packages, for example. |
I haven't found a way to retrieve diff file names. If anyone knows how I'll add a PR for this feature. |
@ryanohoro Should be part of the commit->tree->blob object (See http://gitpython.readthedocs.io/en/stable/tutorial.html#the-tree-object ). Looks like there is a blob.name and blob.path |
Ah ok, it's not in the commit blob that truffleHog iterates over, it's a separate tree object that's part of the commit. I have to cross-reference the objects. There's multiple "blob" attributes in different classes. |
Uses blob.a_path instead of tree.blob[n].name. Let me know if this PR meets your needs. |
Bumps [github.com/envoyproxy/protoc-gen-validate](https://github.com/envoyproxy/protoc-gen-validate) from 0.6.2 to 0.6.3. - [Release notes](https://github.com/envoyproxy/protoc-gen-validate/releases) - [Commits](bufbuild/protoc-gen-validate@v0.6.2...v0.6.3) --- updated-dependencies: - dependency-name: github.com/envoyproxy/protoc-gen-validate dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <[email protected]> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Hey there, we've just released the next major version of TruffleHog! There is an option for this It is a complete rewrite that scans more data sources and now supports detecting and verifying over 600 credentials. |
Many of our projects have a few files that always contain high entropy strings like SHA1 hashes or Base64 encoded values. It would be nice to provide a list of files to be be ignored, sort of like a .gitignore file.
The text was updated successfully, but these errors were encountered: