You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.
Search by package name:
my-package
(implicit)
name:my-package
(explicit)
Search by package filename:
my-package.ext
(implicit)
filename:my-package.ext
(explicit)
Search by package tag:
latest
(implicit)
tag:latest
(explicit)
Search by package version:
1.0.0
(implicit)
version:1.0.0
(explicit)
prerelease:true
(prereleases)
prerelease:false
(no prereleases)
Search by package architecture:
architecture:x86_64
Search by package distribution:
distribution:el
Search by package license:
license:MIT
Search by package format:
format:deb
Search by package status:
status:in_progress
Search by package file checksum:
checksum:5afba
Search by package security status:
severity:critical
Search by package vulnerabilities:
vulnerabilities:>1
vulnerabilities:<1000
Search by # of package downloads:
downloads:>8
downloads:<100
Search by package type:
type:binary
type:source
Search by package size (bytes):
size:>50000
size:<10000
Search by dependency name/version:
dependency:log4j
dependency:log4j=1.0.0
dependency:log4j>1.0.0
Search by uploaded date:
uploaded:>"1 day ago"
uploaded:<"August 14, 2022 EST"
Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY
Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true
Search by repository:
repository:repo-name
Search queries for all Debian-specific (and related) package types
Search by component:
deb_component:unstable
Search queries for all Maven-specific (and related) package types
Search by group ID:
maven_group_id:org.apache
Search queries for all Docker-specific (and related) package types
Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)
Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)
Field type modifiers (depending on the type, you can influence behaviour)
For all queries, you can use:
~foo
for negation
For string queries, you can use:
^foo
to anchor to start of term
foo$
to anchor to end of term
foo*bar
for fuzzy matching
For number/date or version queries, you can use:
>foo
for values greater than
>=foo
for values greater / equal
<foo
for values less than
<=foo
for values less / equal
Need a secure and centralised artifact repository to deliver Alpine,
Cargo,
CocoaPods,
Composer,
Conan,
Conda,
CRAN,
Dart,
Debian,
Docker,
Go,
Helm,
Hex,
LuaRocks,
Maven,
npm,
NuGet,
P2,
Python,
RedHat,
Ruby,
Swift,
Terraform,
Vagrant,
Raw & More packages?
Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.
With support for all major package formats, you can trust us to manage your software supply chain.
trufflehog
8dc11cf78f5cad39708ea6bd29a…
One-liner (summary)
Description
This package was uploaded with the following V2 Distribution manifest:
{
"schemaVersion": 2,
"mediaType": "application/vnd.docker.distribution.manifest.v2+json",
"config": {
"mediaType": "application/vnd.docker.container.image.v1+json",
"size": 8007,
"digest": "sha256:af86fcf4f073a66b3a8fb15984f7618dda7bb724a63a2d8f75ceff13123b3de6"
},
"layers": [
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 3623807,
"digest": "sha256:43c4264eed91be63b206e17d93e75256a6097070ce643c5e8f0379998b44f170"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 455115,
"digest": "sha256:5169ad936bfa24a9f5aa0eaaa43d5ab998bc01a343374b44e100dd7292108e6c"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 15807391,
"digest": "sha256:857dd066c29189c8a67e6d7a0fa904f9d1c68cfff765b4c7c44c0a39fdc08fab"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 249,
"digest": "sha256:fafcb407c7d8d7196b617edf896c36b5b6c670f082d3e0a47bc4939ee0128416"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 5936830,
"digest": "sha256:ef1618be875558b9f66fc0f567dd01db11fb293cc68beef34ac21ff2c585c093"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 8935522,
"digest": "sha256:edadd3112018833eff439a8a8e745314554be7cb1b0ea9bc81869486ae878897"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 452,
"digest": "sha256:e0f958151c4c7de023293a3936b9c29a390b1b30bb121e0d5f55f545023bead3"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 995,
"digest": "sha256:1850fac80860b18521e9460ba133e03ddbfbf724f8418a302a8a9760a6172eea"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 935,
"digest": "sha256:b0b62ee870c4d7d96726c206e8f7f057543c4915f11388a86558fe9eda2ce0cb"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 1479,
"digest": "sha256:6da56bc45dd64853735787b8bb7f8c863bfad275c738c6c6039adc160bd3ad22"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 4784862,
"digest": "sha256:9c0ad73859805635c73981c8e90bf2152eedf4008b41aa0e943df7200ec2f697"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 967,
"digest": "sha256:6f28f64e4c47b6714dc4203d7fa1d73a8292299a27fc4c132095d7fb91017ecb"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 4784931,
"digest": "sha256:37a5aa1814881b7ba6547ef06e68b421a0e0befdcc73039d0702d1b4a055ea47"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 966,
"digest": "sha256:04c57950f174715471950c54ad287d85889f6b08ec7a5e7165a708ead1ce92f9"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 162,
"digest": "sha256:a746ac63a35cc204218a7a74b577aaf441dbe93cffb04f23be26aca5eeb0e0e4"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 141,
"digest": "sha256:e3db456d0728b4dab293f1a722016e92b2f54f434cc47f06e370ca63c5d294f6"
}
]
}
Digest:
sha256:43c4264eed91be63b206e17d93e75256a6097070ce643c5e8f0379998b44f170
Command: /bin/sh -c #(nop) ADD file:5758b97d8301c84a204a6e516241275d785a7cade40b2fb99f01fe122482e283 in / |
3.5 MB | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) CMD ["/bin/sh"] |
32 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV PATH=/usr/local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin |
32 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV LANG=C.UTF-8 |
32 bytes | ||
Digest:
sha256:5169ad936bfa24a9f5aa0eaaa43d5ab998bc01a343374b44e100dd7292108e6c
Command: RUN /bin/sh -c set -eux; apk add --no-cache ca-certificates tzdata ; # buildkit |
444.4 KB | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV GPG_KEY=A035C8C19219BA821ECEA86B64E628F8D684696D |
32 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV PYTHON_VERSION=3.11.10 |
32 bytes | ||
Digest:
sha256:857dd066c29189c8a67e6d7a0fa904f9d1c68cfff765b4c7c44c0a39fdc08fab
Command: RUN /bin/sh -c set -eux; apk add --no-cache --virtual .build-deps gnupg tar xz bluez-dev bzip2-dev dpkg-dev dpkg expat-dev findutils gcc gdbm-dev libc-dev libffi-dev libnsl-dev libtirpc-dev linux-headers make ncurses-dev openssl-dev pax-utils readline-dev sqlite-dev tcl-dev tk tk-dev util-linux-dev xz-dev zlib-dev ; wget -O python.tar.xz "https://www.python.org/ftp/python/${PYTHON_VERSION%%[a-z]*}/Python-$PYTHON_VERSION.tar.xz"; wget -O python.tar.xz.asc "https://www.python.org/ftp/python/${PYTHON_VERSION%%[a-z]*}/Python-$PYTHON_VERSION.tar.xz.asc"; GNUPGHOME="$(mktemp -d)"; export GNUPGHOME; gpg --batch --keyserver hkps://keys.openpgp.org --recv-keys "$GPG_KEY"; gpg --batch --verify python.tar.xz.asc python.tar.xz; gpgconf --kill all; rm -rf "$GNUPGHOME" python.tar.xz.asc; mkdir -p /usr/src/python; tar --extract --directory /usr/src/python --strip-components=1 --file python.tar.xz; rm python.tar.xz; cd /usr/src/python; gnuArch="$(dpkg-architecture --query DEB_BUILD_GNU_TYPE)"; ./configure --build="$gnuArch" --enable-loadable-sqlite-extensions $(test "$gnuArch" != 'riscv64-linux-musl' && echo '--enable-optimizations') --enable-option-checking=fatal --enable-shared --with-lto --with-system-expat --with-ensurepip ; nproc="$(nproc)"; EXTRA_CFLAGS="-DTHREAD_STACK_SIZE=0x100000"; LDFLAGS="${LDFLAGS:--Wl},--strip-all"; make -j "$nproc" "EXTRA_CFLAGS=${EXTRA_CFLAGS:-}" "LDFLAGS=${LDFLAGS:-}" "PROFILE_TASK=${PROFILE_TASK:-}" ; rm python; make -j "$nproc" "EXTRA_CFLAGS=${EXTRA_CFLAGS:-}" "LDFLAGS=${LDFLAGS:--Wl},-rpath='\$\$ORIGIN/../lib'" "PROFILE_TASK=${PROFILE_TASK:-}" python ; make install; cd /; rm -rf /usr/src/python; find /usr/local -depth \( \( -type d -a \( -name test -o -name tests -o -name idle_test \) \) -o \( -type f -a \( -name '*.pyc' -o -name '*.pyo' -o -name 'libpython*.a' \) \) \) -exec rm -rf '{}' + ; find /usr/local -type f -executable -not \( -name '*tkinter*' \) -exec scanelf --needed --nobanner --format '%n#p' '{}' ';' | tr ',' '\n' | sort -u | awk 'system("[ -e /usr/local/lib/" $1 " ]") == 0 { next } { print "so:" $1 }' | xargs -rt apk add --no-network --virtual .python-rundeps ; apk del --no-network .build-deps; export PYTHONDONTWRITEBYTECODE=1; python3 --version; pip3 install --disable-pip-version-check --no-cache-dir --no-compile 'setuptools==65.5.1' wheel ; pip3 --version # buildkit |
15.1 MB | ||
Digest:
sha256:fafcb407c7d8d7196b617edf896c36b5b6c670f082d3e0a47bc4939ee0128416
Command: RUN /bin/sh -c set -eux; for src in idle3 pip3 pydoc3 python3 python3-config; do dst="$(echo "$src" | tr -d 3)"; [ -s "/usr/local/bin/$src" ]; [ ! -e "/usr/local/bin/$dst" ]; ln -svT "$src" "/usr/local/bin/$dst"; done # buildkit |
249 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: CMD ["python3"] |
32 bytes | ||
Digest:
sha256:ef1618be875558b9f66fc0f567dd01db11fb293cc68beef34ac21ff2c585c093
Command: RUN /bin/sh -c apk add --no-cache git less # buildkit |
5.7 MB | ||
Digest:
sha256:edadd3112018833eff439a8a8e745314554be7cb1b0ea9bc81869486ae878897
Command: RUN /bin/sh -c pip install gitdb2==3.0.0 truffleHog==2.2.1 setuptools[core]==70.0.0 # buildkit |
8.5 MB | ||
Digest:
sha256:e0f958151c4c7de023293a3936b9c29a390b1b30bb121e0d5f55f545023bead3
Command: RUN /bin/sh -c addgroup -S nonroot # buildkit |
452 bytes | ||
Digest:
sha256:1850fac80860b18521e9460ba133e03ddbfbf724f8418a302a8a9760a6172eea
Command: RUN /bin/sh -c adduser -D -G nonroot nonroot # buildkit |
995 bytes | ||
Digest:
sha256:b0b62ee870c4d7d96726c206e8f7f057543c4915f11388a86558fe9eda2ce0cb
Command: COPY entrypoint.sh /entrypoint.sh # buildkit |
935 bytes | ||
Digest:
sha256:6da56bc45dd64853735787b8bb7f8c863bfad275c738c6c6039adc160bd3ad22
Command: COPY regex.json /regex.json # buildkit |
1.4 KB | ||
Digest:
sha256:9c0ad73859805635c73981c8e90bf2152eedf4008b41aa0e943df7200ec2f697
Command: COPY /bin/git-credential-myob /bin/git-credential-myob # buildkit |
4.6 MB | ||
Digest:
sha256:6f28f64e4c47b6714dc4203d7fa1d73a8292299a27fc4c132095d7fb91017ecb
Command: RUN /bin/sh -c chmod +x /entrypoint.sh # buildkit |
967 bytes | ||
Digest:
sha256:37a5aa1814881b7ba6547ef06e68b421a0e0befdcc73039d0702d1b4a055ea47
Command: RUN /bin/sh -c chmod g+x /bin/git-credential-myob # buildkit |
4.6 MB | ||
Digest:
sha256:04c57950f174715471950c54ad287d85889f6b08ec7a5e7165a708ead1ce92f9
Command: RUN /bin/sh -c chmod g+x /entrypoint.sh # buildkit |
966 bytes | ||
Digest:
sha256:a746ac63a35cc204218a7a74b577aaf441dbe93cffb04f23be26aca5eeb0e0e4
Command: RUN /bin/sh -c mkdir /tmp/truffle # buildkit |
162 bytes | ||
Digest:
sha256:e3db456d0728b4dab293f1a722016e92b2f54f434cc47f06e370ca63c5d294f6
Command: RUN /bin/sh -c chown -R nonroot:nonroot /tmp/truffle # buildkit |
141 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: USER nonroot |
32 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENTRYPOINT ["/entrypoint.sh"] |
32 bytes |
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
138 |
![]() |
||
![]() |
trufflehog |
47125 |
![]() |
||
![]() |
trufflehog |
6 |
![]() |
||
![]() |
trufflehog |
29 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
1 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
4 |
![]() |
||
![]() |
trufflehog |
35088 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
||
![]() |
trufflehog |
0 |
![]() |
Last scanned
7 months ago
Scan result
Vulnerable
Vulnerability count
6
Max. severity
CriticalTarget: | Python | |
CRITICAL |
CVE-2023-40267: GitPython: Insecure non-multi options in clone and clone_from is not blockedGitPython before 3.1.32 does not block insecure non-multi options in clone and clone_from. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439.Package Name: GitPython Installed Version: 3.0.6 Fixed Version: 3.1.32 References: access.redhat.com github.com github.com github.com github.com github.com github.com lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org nvd.nist.gov ubuntu.com www.cve.org |
|
HIGH |
CVE-2022-24439: GitPython: improper user input validation leads into a RCEAll versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.Package Name: GitPython Installed Version: 3.0.6 Fixed Version: 3.1.30 References: access.redhat.com github.com github.com github.com github.com github.com github.com github.com lists.debian.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org lists.fedoraproject.org nvd.nist.gov security.gentoo.org security.snyk.io ubuntu.com www.cve.org |
|
HIGH |
CVE-2023-40590: gitpython: improper executable lookup on windowsGitPython is a python library used to interact with Git repositories. When resolving a program, Python/Windows look for the current working directory, and after that the PATH environment. GitPython defaults to use the `git` command, if a user runs GitPython from a repo has a `git.exe` or `git` executable, that program will be run instead of the one in the user's `PATH`. This is more of a problem on how Python interacts with Windows systems, Linux and any other OS aren't affected by this. But probably people using GitPython usually run it from the CWD of a repo. An attacker can trick a user to download a repository with a malicious `git` executable, if the user runs/imports GitPython from that directory, it allows the attacker to run any arbitrary commands. There is no fix currently available for windows users, however there are a few mitigations. 1: Default to an absolute path for the git program on Windows, like `C:\\Program Files\\Git\\cmd\\git.EXE` (default git path installation). 2: Require users to set the `GIT_PYTHON_GIT_EXECUTABLE` environment variable on Windows systems. 3: Make this problem prominent in the documentation and advise users to never run GitPython from an untrusted repo, or set the `GIT_PYTHON_GIT_EXECUTABLE` env var to an absolute path. 4: Resolve the executable manually by only looking into the `PATH` environment variable.Package Name: GitPython Installed Version: 3.0.6 Fixed Version: 3.1.33 References: access.redhat.com docs.python.org github.com github.com github.com github.com github.com github.com github.com nvd.nist.gov www.cve.org |
|
HIGH |
CVE-2024-22190: Untrusted search path under some conditions on Windows allows arbitrary code executionGitPython is a python library used to interact with Git repositories. There is an incomplete fix for CVE-2023-40590. On Windows, GitPython uses an untrusted search path if it uses a shell to run `git`, as well as when it runs `bash.exe` to interpret hooks. If either of those features are used on Windows, a malicious `git.exe` or `bash.exe` may be run from an untrusted repository. This issue has been patched in version 3.1.41.Package Name: GitPython Installed Version: 3.0.6 Fixed Version: 3.1.41 References: github.com github.com github.com github.com github.com nvd.nist.gov |
|
MEDIUM |
CVE-2023-41040: GitPython: Blind local file inclusionGitPython is a python library used to interact with Git repositories. In order to resolve some git references, GitPython reads files from the `.git` directory, in some places the name of the file being read is provided by the user, GitPython doesn't check if this file is located outside the `.git` directory. This allows an attacker to make GitPython read any file from the system. This vulnerability is present in https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/refs/symbolic.py#L174-L175. That code joins the base directory with a user given string without checking if the final path is located outside the base directory. This vulnerability cannot be used to read the contents of files but could in theory be used to trigger a denial of service for the program. This issue has been addressed in version 3.1.37.Package Name: GitPython Installed Version: 3.0.6 Fixed Version: 3.1.37 References: access.redhat.com github.com github.com github.com github.com github.com github.com github.com github.com lists.debian.org nvd.nist.gov www.cve.org |
|
Target: | bin/git-credential-myob | |
MEDIUM |
CVE-2023-45288: golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoSAn attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.Package Name: golang.org/x/net Installed Version: v0.17.0 Fixed Version: 0.23.0 References: www.openwall.com www.openwall.com access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org cve.mitre.org cve.mitre.org cve.mitre.org errata.almalinux.org errata.rockylinux.org go.dev go.dev groups.google.com kb.cert.org linux.oracle.com linux.oracle.com lists.fedoraproject.org lists.fedoraproject.org nowotarski.info nowotarski.info nvd.nist.gov pkg.go.dev security.netapp.com security.netapp.com ubuntu.com www.cve.org www.kb.cert.org |
These instructions assume you have setup the repository first (or read it).
To pull trufflehog @ reference/tag d4e3958e862b97cf1101c98614f84820e176c730:
docker pull docker.myob.com/appsec/trufflehog:d4e3958e862b97cf1101c98614f84820e176c730
You can also pull the latest version of this image (if it exists):
docker pull docker.myob.com/appsec/trufflehog:latest
To refer to this image after pulling in a Dockerfile, specify the following:
FROM docker.myob.com/appsec/trufflehog:d4e3958e862b97cf1101c98614f84820e176c730