Skip to content

chore: bootstrap .trufflehog.yml secrets scanning#997

Merged
KooshaPari merged 1 commit into
mainfrom
chore/add-trufflehog
May 2, 2026
Merged

chore: bootstrap .trufflehog.yml secrets scanning#997
KooshaPari merged 1 commit into
mainfrom
chore/add-trufflehog

Conversation

@KooshaPari
Copy link
Copy Markdown
Owner

@KooshaPari KooshaPari commented May 2, 2026

User description

Summary

  • Bootstrap .trufflehog.yml for secrets scanning

Test plan

  • Verify trufflehog scan passes on main branch

Note

Low Risk
Low risk: introduces only a CI/tooling configuration file with path include/exclude rules and no runtime code changes.

Overview
Bootstraps TruffleHog secret scanning by adding .trufflehog.yml, configuring the scan to include all files while excluding common non-source paths like .git, node_modules, target, and build artifacts (dist, lock/sum files).

Reviewed by Cursor Bugbot for commit 8d76464. Bugbot is set up for automated code reviews on this repo. Configure here.


CodeAnt-AI Description

Add repository-wide secret scanning rules

What Changed

  • Added secret scanning rules that check the whole repository by default
  • Excluded generated, dependency, and build output folders like .git, node_modules, target, and dist
  • Skipped lock and sum files to reduce noisy scan results

Impact

✅ Fewer false alarms in secret scans
✅ Cleaner results for generated files
✅ Safer repository-wide secret checks

🔄 Retrigger CodeAnt AI Review

Details

💡 Usage Guide

Checking Your Pull Request

Every time you make a pull request, our system automatically looks through it. We check for security issues, mistakes in how you're setting up your infrastructure, and common code problems. We do this to make sure your changes are solid and won't cause any trouble later.

Talking to CodeAnt AI

Got a question or need a hand with something in your pull request? You can easily get in touch with CodeAnt AI right here. Just type the following in a comment on your pull request, and replace "Your question here" with whatever you want to ask:

@codeant-ai ask: Your question here

This lets you have a chat with CodeAnt AI about your pull request, making it easier to understand and improve your code.

Example

@codeant-ai ask: Can you suggest a safer alternative to storing this secret?

Preserve Org Learnings with CodeAnt

You can record team preferences so CodeAnt AI applies them in future reviews. Reply directly to the specific CodeAnt AI suggestion (in the same thread) and replace "Your feedback here" with your input:

@codeant-ai: Your feedback here

This helps CodeAnt AI learn and adapt to your team's coding style and standards.

Example

@codeant-ai: Do not flag unused imports.

Retrigger review

Ask CodeAnt AI to review the PR again, by typing:

@codeant-ai: review

Check Your Repository Health

To analyze the health of your code repository, visit our dashboard at https://app.codeant.ai. This tool helps you identify potential issues and areas for improvement in your codebase, ensuring your repository maintains high standards of code health.

Copilot AI review requested due to automatic review settings May 2, 2026 12:33
Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copilot encountered an error and was unable to review this pull request. You can try again by re-requesting a review.

@gemini-code-assist
Copy link
Copy Markdown

Warning

You have reached your daily quota limit. Please wait up to 24 hours and I will start processing your requests again!

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 2, 2026

CodeAnt AI is reviewing your PR.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented May 2, 2026

Warning

Rate limit exceeded

@KooshaPari has exceeded the limit for the number of commits that can be reviewed per hour. Please wait 40 minutes and 8 seconds before requesting another review.

To keep reviews running without waiting, you can enable usage-based add-on for your organization. This allows additional reviews beyond the hourly cap. Account admins can enable it under billing.

⌛ How to resolve this issue?

After the wait time has elapsed, a review can be triggered using the @coderabbitai review command as a PR comment. Alternatively, push new commits to this PR.

We recommend that you space out your commits to avoid hitting the rate limit.

🚦 How do rate limits work?

CodeRabbit enforces hourly rate limits for each developer per organization.

Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout.

Please see our FAQ for further information.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Path: .coderabbit.yaml

Review profile: ASSERTIVE

Plan: Pro

Run ID: fa161697-6c96-42ad-a6b7-dc11cd593be2

📥 Commits

Reviewing files that changed from the base of the PR and between b33d8bf and 8d76464.

📒 Files selected for processing (1)
  • .trufflehog.yml

Note

.coderabbit.yaml has unrecognized properties

CodeRabbit is using all valid settings from your configuration. Unrecognized properties (listed below) have been ignored and may indicate typos or deprecated fields that can be removed.

⚠️ Parsing warnings (1)
Validation error: Unrecognized key(s) in object: 'pre_merge_checks'
⚙️ Configuration instructions
  • Please see the configuration documentation for more information.
  • You can also validate your configuration using the online YAML validator.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json
✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch chore/add-trufflehog

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share
Review rate limit: 0/1 reviews remaining, refill in 40 minutes and 8 seconds.

Comment @coderabbitai help to get the list of available commands and usage tips.

@KooshaPari KooshaPari merged commit 5e01746 into main May 2, 2026
10 of 14 checks passed
@KooshaPari KooshaPari deleted the chore/add-trufflehog branch May 2, 2026 12:33
@codeant-ai codeant-ai Bot added the size:S This PR changes 10-29 lines, ignoring generated files label May 2, 2026
@sonarqubecloud
Copy link
Copy Markdown

sonarqubecloud Bot commented May 2, 2026

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 2, 2026

CodeAnt AI finished reviewing your PR.

Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Fix All in Cursor

Bugbot Autofix is ON, but it could not run because the branch was deleted or merged before autofix could start.

Reviewed by Cursor Bugbot for commit 8d76464. Configure here.

Comment thread .trufflehog.yml
- "dist/**"
include:
files:
- "**/*"
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Inconsistent sub-keys: paths vs files in config

Medium Severity

The exclude section uses paths as its sub-key while the include section uses files. These appear to serve the same purpose (specifying glob patterns for file paths) and the asymmetry looks like a typo. If the consuming tool expects a consistent key name, one of these sections will be silently ignored, undermining secrets scanning coverage.

Additional Locations (1)
Fix in Cursor Fix in Web

Reviewed by Cursor Bugbot for commit 8d76464. Configure here.

@KooshaPari KooshaPari restored the chore/add-trufflehog branch May 2, 2026 16:55
Comment thread .trufflehog.yml
- "*.lock"
- "dist/**"
include:
files:
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

SUGGESTION: Incorrect key for Trufflehog include section; should be paths to match exclude and be valid.

Suggested change
files:
paths:

@kilo-code-bot
Copy link
Copy Markdown

kilo-code-bot Bot commented May 2, 2026

Code Review Summary

Status: 1 Issues Found | Recommendation: Address before merge

Overview

Severity Count
CRITICAL 0
WARNING 0
SUGGESTION 1
Issue Details (click to expand)

SUGGESTION

File Line Issue
.trufflehog.yml 10 Incorrect key for Trufflehog include section; should be paths to match exclude and be valid.
Files Reviewed (1 files)
  • .trufflehog.yml - 1 issues

Reviewed by nemotron-3-super-120b-a12b-20230311:free · 117,397 tokens

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 11, 2026

CodeAnt AI is running the review.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@codeant-ai codeant-ai Bot added size:S This PR changes 10-29 lines, ignoring generated files and removed size:S This PR changes 10-29 lines, ignoring generated files labels May 11, 2026
@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 11, 2026

Sequence Diagram

This PR adds a TruffleHog configuration that enables repository wide secret scanning while excluding common build and dependency artifacts to reduce false positives in CI.

sequenceDiagram
    participant Developer
    participant CI
    participant TruffleHog
    participant Repo

    Developer->>CI: Push changes to main branch
    CI->>TruffleHog: Run secrets scan with config file
    TruffleHog->>Repo: Scan all repository files
    TruffleHog->>TruffleHog: Exclude git, dependency, build and lock paths
    TruffleHog-->>CI: Return secrets scan results
    CI-->>Developer: Show scan status in pipeline
Loading

Generated by CodeAnt AI

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 11, 2026

CodeAnt AI finished running the review.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 11, 2026

CodeAnt AI is running the review.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@codeant-ai codeant-ai Bot added size:S This PR changes 10-29 lines, ignoring generated files and removed size:S This PR changes 10-29 lines, ignoring generated files labels May 11, 2026
@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 11, 2026

Sequence Diagram

This PR adds a TruffleHog configuration file that drives repository-wide secrets scans while excluding common generated and dependency paths to reduce false positives in CI.

sequenceDiagram
    participant Developer
    participant CI
    participant TruffleHog
    participant Repository

    Developer->>CI: Push changes or open merge request
    CI->>TruffleHog: Start secrets scan with config file
    TruffleHog->>Repository: Scan files matching include rules
    TruffleHog->>Repository: Skip excluded paths and lock or sum files
    TruffleHog-->>CI: Return secrets scan results with reduced noise
    CI-->>Developer: Show scan status and findings in pipeline
Loading

Generated by CodeAnt AI

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 11, 2026

CodeAnt AI finished running the review.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 12, 2026

CodeAnt AI is running the review.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@codeant-ai codeant-ai Bot added size:S This PR changes 10-29 lines, ignoring generated files and removed size:S This PR changes 10-29 lines, ignoring generated files labels May 12, 2026
@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 12, 2026

Sequence Diagram

This PR adds a Trufflehog configuration file that scans all repository files for secrets while excluding common build, dependency, and lock files to reduce noise in scan results.

sequenceDiagram
    participant Developer
    participant CI
    participant Trufflehog
    participant Repository

    Developer->>CI: Push changes
    CI->>Trufflehog: Run secrets scan
    Trufflehog->>Repository: Load include and exclude rules
    Trufflehog->>Repository: Scan files excluding build and dependency paths
    Trufflehog-->>CI: Return secrets scan results
    CI-->>Developer: Display scan outcome
Loading

Generated by CodeAnt AI

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 12, 2026

CodeAnt AI finished running the review.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 12, 2026

CodeAnt AI is running the review.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@codeant-ai codeant-ai Bot added size:S This PR changes 10-29 lines, ignoring generated files and removed size:S This PR changes 10-29 lines, ignoring generated files labels May 12, 2026
@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 12, 2026

Sequence Diagram

This PR adds a TruffleHog configuration that scans all repository files for secrets while excluding common generated and dependency paths to reduce false positives.

sequenceDiagram
    participant Developer
    participant CI
    participant TruffleHog
    participant Repository

    Developer->>CI: Push changes or open pull request
    CI->>TruffleHog: Trigger secrets scan
    TruffleHog->>Repository: Scan files with include rules
    Repository-->>TruffleHog: File contents excluding configured paths
    TruffleHog-->>CI: Secrets scan results
    CI-->>Developer: Report secrets findings in pipeline
Loading

Generated by CodeAnt AI

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented May 12, 2026

CodeAnt AI finished running the review.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size:S This PR changes 10-29 lines, ignoring generated files

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants