Cyber security

Project History Of Tartufo – A Comprehensive Update

Explore the evolution of Tartufo, a powerful security tool, through its detailed project history.

This article delves into significant updates, from enhanced Python support to critical bug fixes, charting its development from early 2022 to the latest release.

Discover how Tartufo has adapted to changing technological landscapes, ensuring robust security solutions for its users.

Features: * [#433] – Dropped support for deprecated flags rules, b64, hex

and corresponding code around deprecated options. Removed support for old signatures which generated with +/- chars in git diff.

  • [#411] – Drop support for python 3.6. This version reached end of life several years ago, and end of security support at the end of 2021. Users with a requirement to run tartufo on this python version should remain at v3.3.x.
  • [#403] – Add support for python 3.11. * Update various support libraries to current versions * Rebase container to python 3.11 * Add CI step to verify container is operational
  • [#348] – Add –no-git-check option to skip confirmation dialog for scan-folder

v3.3.1 – 23 Nov 2022

Bug fixes: * [#408] – 3.3.0 container broken

  • Rebuild container using python 3.10 base instead of python 3.11
  • Eliminates reference to missing library present in 3.3.0 container
  • Eliminates requirement for build-it-yerself libraries in container

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How OpenClaw Works

Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…

2 days ago

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

4 days ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

4 days ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

6 days ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

6 days ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

3 months ago