Use this action to scan Amazon Simple Storage Service (S3) buckets with TruffleHog, an open-source secret scanning tool to detect secrets and sensitive information.
All CloudBees action repositories are listed at CloudBees, Inc. on GitHub. |
Prerequisites
This action requires prior authentication to Amazon Web Services, so you must invoke the Amazon authentication action before invoking the TruffleHog S3 scan action. For more information, refer to the AWS credentials configuration action.
Inputs
Input name | Data type | Required | Description |
---|---|---|---|
|
string |
Yes |
Name of the S3 bucket. |
|
integer |
No |
The number threshold of very high severity vulnerabilities at which the build is broken. |
Usage examples
In your YAML file, add:
- name: Configure AWS credentials uses: cloudbees-io/configure-aws-credentials@v1 with: aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} aws-region: us-east-2 - name: Run TruffleHog S3 scan uses: cloudbees-io/trufflehog-secret-scan-s3@v1 with: bucket-name: "test-bucket"
In the following example, if there are more than three very high severity vulnerabilities identified, the build is broken.
- name: Run TruffleHog S3 scan with threshold uses: cloudbees-io/trufflehog-secret-scan-s3@v1 with: bucket-name: "test-bucket" threshold-very-high: 3