Cyber security

Project History Of Tartufo – A Comprehensive Update

Explore the evolution of Tartufo, a powerful security tool, through its detailed project history.

This article delves into significant updates, from enhanced Python support to critical bug fixes, charting its development from early 2022 to the latest release.

Discover how Tartufo has adapted to changing technological landscapes, ensuring robust security solutions for its users.

Features: * [#433] – Dropped support for deprecated flags rules, b64, hex

and corresponding code around deprecated options. Removed support for old signatures which generated with +/- chars in git diff.

  • [#411] – Drop support for python 3.6. This version reached end of life several years ago, and end of security support at the end of 2021. Users with a requirement to run tartufo on this python version should remain at v3.3.x.
  • [#403] – Add support for python 3.11. * Update various support libraries to current versions * Rebase container to python 3.11 * Add CI step to verify container is operational
  • [#348] – Add –no-git-check option to skip confirmation dialog for scan-folder

v3.3.1 – 23 Nov 2022

Bug fixes: * [#408] – 3.3.0 container broken

  • Rebuild container using python 3.10 base instead of python 3.11
  • Eliminates reference to missing library present in 3.3.0 container
  • Eliminates requirement for build-it-yerself libraries in container

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago