Cyber security

Project History Of Tartufo – A Comprehensive Update

Explore the evolution of Tartufo, a powerful security tool, through its detailed project history.

This article delves into significant updates, from enhanced Python support to critical bug fixes, charting its development from early 2022 to the latest release.

Discover how Tartufo has adapted to changing technological landscapes, ensuring robust security solutions for its users.

Features: * [#433] – Dropped support for deprecated flags rules, b64, hex

and corresponding code around deprecated options. Removed support for old signatures which generated with +/- chars in git diff.

  • [#411] – Drop support for python 3.6. This version reached end of life several years ago, and end of security support at the end of 2021. Users with a requirement to run tartufo on this python version should remain at v3.3.x.
  • [#403] – Add support for python 3.11. * Update various support libraries to current versions * Rebase container to python 3.11 * Add CI step to verify container is operational
  • [#348] – Add –no-git-check option to skip confirmation dialog for scan-folder

v3.3.1 – 23 Nov 2022

Bug fixes: * [#408] – 3.3.0 container broken

  • Rebuild container using python 3.10 base instead of python 3.11
  • Eliminates reference to missing library present in 3.3.0 container
  • Eliminates requirement for build-it-yerself libraries in container

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

4 days ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

4 days ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

5 days ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

7 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

1 week ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

1 week ago