DevSecOps - Kubernetes DevOps & Security

DevSecOps Pipeline

Git Hooks and Talisman Introduction

In this lesson, we’ll cover how to use Git hooks—scripts that run at specific points in your Git workflow—to catch accidental commits of sensitive data. We’ll also introduce Talisman, an open-source tool by ThoughtWorks that automates secret scanning in your repository.

Why Git Hooks Matter

In 2015, a developer accidentally pushed AWS S3 access keys to GitHub. Within five minutes, automated bots exploited those keys for Bitcoin mining, accruing a $2,400 bill. Git hooks help you stop this from happening by running custom scripts at critical events like commits and pushes.

The image discusses the risks of accidentally leaking sensitive information like AWS keys on GitHub through git commits, highlighting a case where this led to financial consequences. It emphasizes using pre-commit hooks to prevent such leaks.

Common Git Hook Events

HookTriggers Before
pre-commitFinalizing a commit
pre-pushSending commits to remote

Introducing Talisman

Talisman installs Git hooks to scan outgoing changes for secrets—passwords, API tokens, private keys, credit-card numbers, and more. It also offers a history-scan feature to uncover any secrets already in your repo.

The image describes "Talisman," a tool that installs a hook in a repository to prevent sensitive information from leaving a developer's workstation, with options for global or single project installation.

Installation Options

ScopeDescription
GlobalApplies hooks to all repos you clone or init on your machine.
Single-Project (pre-push)Limits Talisman to one repo, using a pre-push hook.

We’ll demonstrate the single-project approach with a pre-push hook.

# Download and make the installer executable
curl https://thoughtworks.github.io/talisman/install.sh > ~/install-talisman.sh
chmod +x ~/install-talisman.sh

# In your project directory
cd my-git-project
~/install-talisman.sh

Note

If you want to apply Talisman globally, see the global_install_scripts in the Talisman repo.

How Talisman Works

When you run git push, Talisman inspects your changes for:

  • Base64 or hex-encoded secrets
  • Common secret patterns (e.g., passwords, tokens)
  • Large files with potential key material
  • Credit-card numbers or sensitive file extensions (.keys, .secrets, .credentials)

If issues are detected, Talisman outputs a report:

FILEERRORSSEVERITY
test.txtPotential secret pattern: password-passwordlow
git push origin main

Another example:

FILEERRORSSEVERITY
awsPotential secret pattern: pikey=5589 4513 5412 4562low

filename: aws
checksum: 14e3763161c3485181806245883bf1cebfa4f241dd23f4f01a5f9793ba45

When prompted:

? Do you want to add aws with above checksum in talismanrc ? No

If the file is safe, answer Yes to whitelist it in .talismanrc. Otherwise, you can bypass Talisman with:

git push origin main --no-verify

Warning

Bypassing hooks (--no-verify) skips all pre-push checks. Use this only when you’re certain no sensitive data is included.

Managing Talisman

To remove Talisman from your project, delete the hook scripts in .git/hooks/ (for example, pre-push or pre-commit).

Further Reading

Watch Video

Watch video content

Previous
Section 3 Topics