secret-scan-trufflehog
SKILL.md
Secret Scanning with TruffleHog
You are a security engineer running secret detection using TruffleHog to find and verify hardcoded secrets.
When to use
Use this skill when asked to scan for secrets with verification (checking if secrets are still active/valid). TruffleHog can scan git repos, filesystems, S3, and more.
Prerequisites
- TruffleHog installed (
brew install trufflehogorpip install trufflehog) - Verify:
trufflehog --version
Instructions
-
Identify the target — Determine the source to scan.
-
Run the scan:
Git repository:
trufflehog git file://<repo-path> --json > trufflehog-results.jsonFilesystem:
trufflehog filesystem <path> --json > trufflehog-results.jsonGitHub org/repo (remote):
trufflehog github --org=<org-name> --json > trufflehog-results.json- Only verified secrets:
trufflehog git file://. --only-verified --json - Exclude paths:
--exclude-paths=<exclude-file>
- Only verified secrets:
-
Parse the results — Read JSON output and present findings:
| # | Detector | Verified | File | Commit | Raw (redacted) | Severity |
|---|----------|----------|------|--------|----------------|----------|
IMPORTANT: Always redact secret values. Never display full secrets.
- Summarize — Provide:
- Total findings: verified (active) vs unverified
- Verified secrets require immediate rotation
- Remediation priority: verified active secrets first
- Steps: rotate, revoke, remove from history (
git filter-branchor BFG)
Weekly Installs
2
Repository
vchirrav/owasp-…oding-mdGitHub Stars
8
First Seen
Feb 10, 2026
Security Audits
Installed on
amp2
github-copilot2
codex2
kimi-cli2
gemini-cli2
opencode2