Convert Figma logo to code with AI

thoughtworks logotalisman

Using a pre-commit hook, Talisman validates the outgoing changeset for things that look suspicious — such as tokens, passwords, and private keys.

1,905
242
1,905
71

Top Related Projects

An enterprise friendly way of detecting and preventing secrets in code.

Prevents you from committing secrets and credentials into git repositories

17,623

Protect and discover secrets using Gitleaks 🔑

Find, verify, and analyze leaked credentials

:busts_in_silhouette: A bash-tool to store your private data inside a git repository.

Quick Overview

Talisman is a pre-commit hook tool designed to prevent sensitive information from being accidentally committed to Git repositories. It scans commits for potential secrets, such as passwords, API keys, and tokens, helping developers maintain security best practices and avoid exposing sensitive data.

Pros

  • Easy to install and integrate with existing Git workflows
  • Customizable rules and configurations to fit specific project needs
  • Supports multiple programming languages and file types
  • Actively maintained and regularly updated

Cons

  • May produce false positives, requiring manual review
  • Can slow down the commit process, especially for large repositories
  • Limited to pre-commit checks, not addressing existing sensitive data in repositories
  • Requires developer awareness and cooperation to be effective

Getting Started

To install Talisman as a pre-commit hook:

# For macOS and Linux
curl --silent  https://raw.githubusercontent.com/thoughtworks/talisman/master/global_install_scripts/install.bash > /tmp/install_talisman.bash && /bin/bash /tmp/install_talisman.bash

# For Windows (using PowerShell)
Invoke-WebRequest -UseBasicParsing -Uri "https://raw.githubusercontent.com/thoughtworks/talisman/master/global_install_scripts/install.ps1" -OutFile $env:TEMP\install_talisman.ps1 && Set-ExecutionPolicy Unrestricted -Scope Process -Force; & $env:TEMP\install_talisman.ps1

After installation, Talisman will automatically run on each commit. To configure Talisman, create a .talismanrc file in your repository root:

fileignoreconfig:
- filename: path/to/ignored/file
  checksum: <checksum_of_file>
threshold: medium

This configuration ignores specific files and sets the detection threshold to medium sensitivity.

Competitor Comparisons

An enterprise friendly way of detecting and preventing secrets in code.

Pros of detect-secrets

  • More flexible and customizable scanning options
  • Supports multiple programming languages and file types
  • Provides a baseline feature for managing false positives

Cons of detect-secrets

  • Requires more setup and configuration
  • May have a steeper learning curve for new users
  • Less integrated with Git hooks compared to Talisman

Code Comparison

detect-secrets:

from detect_secrets import SecretsCollection
from detect_secrets.settings import default_settings

secrets = SecretsCollection()
secrets.scan_file('path/to/file', default_settings)

Talisman:

# Add Talisman as a pre-commit hook
curl https://thoughtworks.github.io/talisman/install.sh > install-talisman.sh
chmod +x install-talisman.sh
./install-talisman.sh

Both tools aim to prevent secrets from being committed to repositories, but they differ in their approach and implementation. detect-secrets offers more flexibility and customization options, making it suitable for complex projects with diverse requirements. Talisman, on the other hand, provides a simpler setup process and tighter integration with Git hooks, making it easier for teams to adopt quickly. The choice between the two depends on the specific needs of the project and the team's preferences for configuration and management of secret detection tools.

Prevents you from committing secrets and credentials into git repositories

Pros of git-secrets

  • Simpler setup and configuration process
  • Native integration with AWS-specific secret patterns
  • Lightweight and focused specifically on preventing secret leaks

Cons of git-secrets

  • Limited to pre-commit hooks, lacking comprehensive scanning capabilities
  • Less flexible in terms of customization and rule creation
  • Primarily focused on AWS secrets, potentially missing other types of sensitive data

Code Comparison

git-secrets:

#!/bin/bash
git secrets --install
git secrets --register-aws

Talisman:

version: '1'
fileignoreconfig:
  - filename: config/database.yml
    checksum: 190f6aec3c34f0ab57f181f7a3f3d562c7a40dfb7feb54f8b788c25da84bd6b1

Summary

git-secrets is a lightweight tool focused on preventing AWS secret leaks, offering simple setup and native AWS integration. However, it lacks the comprehensive scanning capabilities and flexibility of Talisman. Talisman provides more extensive customization options and broader secret detection but may require more setup effort. The choice between the two depends on specific project needs and the types of secrets being protected.

17,623

Protect and discover secrets using Gitleaks 🔑

Pros of Gitleaks

  • More extensive and customizable scanning rules
  • Supports scanning of Git history and specific commits
  • Actively maintained with frequent updates

Cons of Gitleaks

  • Slower scanning speed for large repositories
  • May produce more false positives due to broader rule set

Code Comparison

Talisman configuration (.talismanrc):

fileignoreconfig:
- filename: sensitive_file.txt
  checksum: "<SHA256 hash>"

Gitleaks configuration (.gitleaks.toml):

[[rules]]
description = "API Key"
regex = '''(?i)api[_]?key'''
tags = ["key", "API", "generic"]

Both tools aim to prevent sensitive information from being committed to repositories, but they differ in their approach and configuration. Talisman focuses on pre-commit hooks and uses a simpler configuration, while Gitleaks offers more advanced scanning capabilities and customizable rules. Talisman may be easier to set up for basic use cases, whereas Gitleaks provides more flexibility for complex scenarios and can be integrated into various stages of the development process.

Find, verify, and analyze leaked credentials

Pros of Trufflehog

  • More comprehensive scanning capabilities, including support for various version control systems and cloud providers
  • Actively maintained with frequent updates and new features
  • Offers both CLI and API usage, providing flexibility for integration

Cons of Trufflehog

  • Can be slower for large repositories due to its extensive scanning
  • May produce more false positives, requiring additional filtering and configuration

Code Comparison

Talisman (pre-commit hook configuration):

version: '1.0'
fileignoreconfig:
  - filename: config/database.yml
    checksum: 0000000000000000000000000000000000000000000000000000000000000000

Trufflehog (CLI usage):

trufflehog git https://github.com/example/repo.git

Both tools aim to detect secrets in code repositories, but they differ in their approach and implementation. Talisman focuses on pre-commit hooks and is designed to be lightweight, while Trufflehog offers more extensive scanning capabilities across various platforms and integrations.

Talisman is easier to set up for pre-commit checks, making it ideal for teams looking for a simple solution. Trufflehog, on the other hand, provides more comprehensive scanning options and is better suited for larger-scale secret detection across multiple repositories and cloud environments.

:busts_in_silhouette: A bash-tool to store your private data inside a git repository.

Pros of git-secret

  • Focuses specifically on encrypting sensitive files, providing a more specialized solution
  • Allows for easy sharing of encrypted files among team members using GPG keys
  • Supports multiple operating systems, including Linux, macOS, and Windows

Cons of git-secret

  • Requires manual setup and configuration for each repository
  • Limited to file encryption, lacking broader secret detection capabilities
  • May require additional tools or plugins for integration with CI/CD pipelines

Code Comparison

git-secret:

git secret init
git secret tell user@example.com
git secret add sensitive_file.txt
git secret hide

Talisman:

fileignoreconfig:
- filename: sensitive_file.txt
  checksum: 1234567890abcdef1234567890abcdef

Summary

git-secret is a specialized tool for encrypting sensitive files in Git repositories, while Talisman offers a broader approach to preventing secrets from being committed. git-secret provides easy file sharing among team members but requires manual setup. Talisman integrates seamlessly with Git hooks and offers more comprehensive secret detection capabilities. The choice between the two depends on specific project needs and team preferences.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

Talisman

A tool to detect and prevent secrets from getting checked in

License: MIT Go Report Card contributions welcome Build Status Coverage Status

Table of Contents

What is Talisman?

Talisman is a tool that scans git changesets to ensure that potential secrets or sensitive information do not leave the developer's workstation.

It validates the outgoing changeset for things that look suspicious - such as potential SSH keys, authorization tokens, private keys etc.

Installation

Talisman supports MAC OSX, Linux and Windows.

Talisman can be installed and used in one of the following ways:

  1. As a standalone executable
  2. As a git hook as a global git hook template and a CLI utility (for git repo scanning)
  3. As a git hook into a single git repository

Talisman can be set up as either a pre-commit or pre-push hook on the git repositories.

Find the instructions below.

Disclaimer: Secrets creeping in via a forced push in a git repository cannot be detected by Talisman. A forced push is believed to be notorious in its own ways, and we suggest git repository admins to apply appropriate measures to authorize such activities.

Install onto path (recommended approach)

We recommend installing talisman onto your path so that it is available for git hook frameworks and scripts. Pick the correct binary for your system from our Releases Page, or run our install script:

bash -c "$(curl --silent https://raw.githubusercontent.com/thoughtworks/talisman/main/install.sh)"

Or set environment variable INSTALL_LOCATION to specify a custom location for the binary:

INSTALL_LOCATION=/usr/local/bin bash -c "$(curl --silent https://raw.githubusercontent.com/thoughtworks/talisman/main/install.sh)"

Or using linuxbrew in Linux and homebrew in macOS by running the following command in terminal:

brew install talisman

Installation as a global hook template

We offer scripts that will install Talisman as a pre-commit git hook template, as that will cause Talisman to be present, not only in your existing git repositories, but also in any new repository that you 'init' or 'clone'.

  1. Run the following command on your terminal, to download and install the binary at $HOME/.talisman/bin

As a pre-commit hook:

bash -c "$(curl --silent https://raw.githubusercontent.com/thoughtworks/talisman/main/global_install_scripts/install.bash)"

OR

As a pre-push hook:

bash -c "$(curl --silent https://raw.githubusercontent.com/thoughtworks/talisman/main/global_install_scripts/install.bash)" -- pre-push
  1. If you do not have TALISMAN_HOME set up in your $PATH, you will be asked an appropriate place to set it up. Choose the option number where you set the profile source on your machine.

Remember to execute source on the path file or restart your terminal. If you choose to set the $PATH later, please export TALISMAN_HOME=$HOME/.talisman/bin to the path.

  1. Choose a base directory where Talisman should scan for all git repositories, and set up a git hook (pre-commit or pre-push, as chosen in step 1) as a symlink. This script will not clobber pre-existing hooks. If you have existing hooks you can add talisman through a hook framework
  • you can set SEARCH_ROOT environment variable with the path of the base directory before executing the installation so you don't need to input it manually during the installation

Configuring a project

Using with hook frameworks

Globally installing talisman as a hook will not clobber any existing hooks. If the installation script finds any existing hooks, it will only indicate so on the console. To run multiple hooks we suggest using a hook framework, such as pre-commit or husky. These instructions assume that the talisman executable is installed somewhere on your system's path.

Pre-commit

Use pre-commit to manage existing hooks along with Talisman. Reference our pre-commit-hooks in your .pre-commit-config.yaml:

-   repo: https://github.com/thoughtworks/talisman
    rev: 'v1.28.0'  # Update me!
    hooks:
      # both pre-commit and pre-push supported
      # -   id: talisman-push
      - id: talisman-commit
        entry: cmd --githook pre-commit

Husky

husky is an npm module for managing hooks. Add the following line to the husky pre-commit configuration in your package.json:

talisman --githook pre-commit

Directly invoking talisman

Once the talisman executable is installed you can configure a standalone pre-commit hook for a git repository:

cd my-git-project
echo "talisman -g pre-commit" >> .git/hooks/pre-commit
chmod +x .git/hooks/pre-commit

Upgrading

Since release v0.4.4, Talisman automatically updates the binary to the latest release, when the hook is invoked (at pre-commit/pre-push, as set up). So, just sit back, relax, and keep using the latest Talisman without any extra efforts.

The following environment variables can be set:

  1. TALISMAN_SKIP_UPGRADE: Set to true if you want to skip the automatic upgrade check. Default is false
  2. TALISMAN_UPGRADE_CONNECT_TIMEOUT: Max connect timeout before the upgrade is cancelled(in seconds). Default is 10 seconds.

If at all you need to manually upgrade, here are the steps:
[Recommended] Update Talisman binary and hook scripts to the latest release:

curl --silent  https://raw.githubusercontent.com/thoughtworks/talisman/master/global_install_scripts/update_talisman.bash > /tmp/update_talisman.bash && /bin/bash /tmp/update_talisman.bash

Update only Talisman binary by executing:

curl --silent  https://raw.githubusercontent.com/thoughtworks/talisman/master/global_install_scripts/update_talisman.bash > /tmp/update_talisman.bash && /bin/bash /tmp/update_talisman.bash talisman-binary

Talisman in action

After the installation is successful, Talisman will run checks for obvious secrets automatically before each commit or push (as chosen during installation). In case there are any security breaches detected, talisman will display a detailed report of the errors:

$ git push
Talisman Report:
+-----------------+-------------------------------------------------------------------------------+
|     FILE        |                                    ERRORS                                     |
+-----------------+-------------------------------------------------------------------------------+
| danger.pem      | The file name "danger.pem"                                                    |
|                 | failed checks against the                                                     |
|                 | pattern ^.+\.pem$                                                             |
+-----------------+-------------------------------------------------------------------------------+
| danger.pem      | Expected file to not contain hex encoded texts such as:                    |
|                 | awsSecretKey=c64e8c79aacf5ddb02f1274db2d973f363f4f553ab1692d8d203b4cc09692f79 |
+-----------------+-------------------------------------------------------------------------------+

In the above example, the file danger.pem has been flagged as a security breach due to the following reasons:

  • The filename matches one of the pre-configured patterns.
  • The file contains an awsSecretKey which is scanned and flagged by Talisman

If you have installed Talisman as a pre-commit hook, it will scan only the diff within each commit. This means that it would only report errors for parts of the file that were changed.

In case you have installed Talisman as a pre-push hook, it will scan the complete file in which changes are made. As mentioned above, it is recommended that you use Talisman as a pre-commit hook.

Validations

The following detectors execute against the changesets to detect secrets/sensitive information:

  • Encoded values - scans for encoded secrets in Base64, hex etc.
  • File content - scans for suspicious content in file that could be potential secrets or passwords
  • File size - scans for large files that may potentially contain keys or other secrets
  • Entropy - scans for content with high entropy that are likely to contain passwords
  • Credit card numbers - scans for content that could be potential credit card numbers
  • File names - scans for file names and extensions that could indicate them potentially containing secrets, such as keys, credentials etc.

Ignoring Files

If you're really sure you want to push that file, you can configure it into the .talismanrc file in the project root. The contents required for ignoring your failed files will be printed by Talisman on the console immediately after the Talisman Error Report:

If you are absolutely sure that you want to ignore the above files from talisman detectors, consider pasting the following format in .talismanrc file in the project root
fileignoreconfig:
- filename: danger.pem
  checksum: cf97abd34cebe895417eb4d97fbd7374aa138dcb65b1fe7f6b6cc1238aaf4d48
  ignore_detectors: []

Entering this in the .talismanrc file will ensure that Talisman will ignore the danger.pem file as long as the checksum matches the value mentioned in the checksum field.

Interactive mode

Available only for non-Windows users

If it is too much of a hassle to keep copying content to .talismanrc everytime you encounter an error from Talisman, you could enable the interactive mode and let Talisman assist you in prompting the additions of the files to ignore. Just follow the simple steps:

  1. Open your bash profile where your environment variables are set (.bashrc, .bash_profile, .profile or any other location)
  2. You will see TALISMAN_INTERACTIVE variable under # >>> talisman >>>
  3. If not already set to true, add export TALISMAN_INTERACTIVE=true
  4. Don't forget to save and source the file

That's it! Every time Talisman hook finds an error during pre-push/pre-commit, just follow the instructions as Talisman suggests. Be careful to not ignore a file without verifying the content. You must be confident that no secret is getting leaked out.

Ignoring specific detectors

Below is a detailed description of the various fields that can be configured into the .talismanrc file:

  • filename : This field should mention the fully qualified filename.
  • checksum : This field should always have the value specified by Talisman in the message displayed above. If at any point, a new change is made to the file, it will result in a new checksum and Talisman will scan the file again for any potential security threats.
  • ignore_detectors : This field will disable specific detectors for a particular file. For example, if your init-env.sh filename triggers a warning, you can only disable this warning while still being alerted if other things go wrong (e.g. file content):
fileignoreconfig:
- filename: init-env.sh
  checksum: cf97abd34cebe895417eb4d97fbd7374aa138dcb65b1fe7f6b6cc1238aaf4d48
  ignore_detectors: [filename, filesize]

Note: Here both filename and filesize detectors are ignored for init-env.sh, but filecontent detector will still activate on init-env.sh

At the moment, you can ignore

  • filecontent
  • filename
  • filesize

Ignoring specific keywords

Because some of your files might contain keywords such as key or pass that are not necessarily related to secrets, you might want to ignore these keywords to reduce the number of false positives. This can be achieved by using the allowed_patterns field at the file level and/or at the repository level:

fileignoreconfig:
- filename: test
  allowed_patterns: [key]
allowed_patterns:
- keyword
- pass

In the previous example, key is allowed in the test file, keyword and pass are allowed at the repository level.

The allowed_patterns field also supports Golang regular expressions. Here is a simple code example where Golang RegExp can be useful:

export AWS_ACCESS_KEY_ID = AKIAIO5FODNN7EXAMPLE
export AWS_ACCESS_KEY_ID=$(vault read -field=value path/to/aws-access-key-id)

By default, Talisman will alert for both lines. In the second line, we are extracting the AWS Access Key ID from Hashicorp Vault which doesn't expose the secret to the code. If this type of usage is common in your code, you might want to tell Talisman to not alert when you use a Vault. This can be achieved with a configuration like:

allowed_patterns:
- export\ AWS[ \w]*KEY[ \w]*=.*vault\ read.*

Ignoring multiple files of same type (with wildcards)

You can choose to ignore all files of a certain type, because you know they will always be safe, and you wouldn't want Talisman to scan them.

Steps:

  1. Format a wildcard pattern for the files you want to ignore. For example, *.lock
  2. Use the checksum calculator to feed the pattern and attain a collective checksum. For example, talisman --checksum="*.lock"
  3. Copy the fileconfig block, printed on console, to .talismanrc file.

If any of the files are modified, talisman will scan the files again, unless you re-calculate the new checksum and replace it in .talismanrc file.

Ignoring files by specifying language scope

You can choose to ignore files by specifying the language scope for your project in your talismanrc.

scopeconfig:
  - scope: go
  - scope: node
  - scope: images
  - scope: php
  - scope: python

Talisman is configured to ignore certain files based on the specified scope. For example, mentioning the node scope in the scopeconfig will prevent talisman from scanning files such as the yarn.lock or package-lock.json.

You can specify multiple scopes.

Currently .talismanrc only supports scopeconfig support for go, node, php and images. Other scopes will be added shortly.

Custom search patterns

You can specify custom regex patterns to look for in the current repository

custom_patterns:
- pattern1
- pattern2


Note: The use of .talismanignore has been deprecated. File .talismanrc replaces it because:

  • .talismanrc has a much more legible yaml format
  • It also brings in more secure practices with every modification of a file with a potential sensitive value to be reviewed
  • The new format also brings in the extensibility to introduce new usable functionalities. Keep a watch out for more

Configuring severity threshold

Each validation is associated with a severity

  1. Low
  2. Medium
  3. High

You can specify a threshold in your .talismanrc:

threshold: medium

This will report all Medium severity issues and higher (Potential risks that are below the threshold will be reported in the warnings)

  1. A list of all risks with their severity level can be found in this configuration file.
  2. By default, the threshold is set to low.
  3. Any custom search patterns you add, are considered to be of high severity.

Configuring custom severities

You can customize the security levels of the detectors provided by Talisman in the .talismanrc file:

custom_severities:
- detector: Base64Content
  severity: medium
- detector: HexContent
  severity: low

By using custom severities and a severity threshold, Talisman can be configured to alert only on what is important based on your context. This can be useful to reduce the number of false positives.

Talisman as a CLI utility

If you execute talisman on the command line, you will be able to view all the parameter options you can pass

  -c, --checksum string          checksum calculator calculates checksum and suggests .talismanrc format
  -d, --debug                    enable debug mode (warning: very verbose)
  -g, --githook string           either pre-push or pre-commit (default "pre-push")
      --ignoreHistory            scanner scans all files on current head, will not scan through git commit history
  -i, --interactive              interactively update talismanrc (only makes sense with -g/--githook)
  -p, --pattern string           pattern (glob-like) of files to scan (ignores githooks)
  -r, --reportdirectory string   directory where the scan reports will be stored
  -s, --scan                     scanner scans the git commit history for potential secrets
  -w, --scanWithHtml             generate html report (**Make sure you have installed talisman_html_report to use this, as mentioned in Readme**)
  -v, --version                  show current version of talisman

Interactive mode

When you regularly have too many files that get are flagged by talisman hook, which you know should be fine to check in, you can use this feature to let talisman ease the process for you. The interactive mode will allow Talisman to prompt you to directly add files you want to ignore to .talismanrc from command prompt directly. To enable this feature, you need TALISMAN_INTERACTIVE variable to be set as true in your bash file.

You can invoke talisman in interactive mode by either of the 2 ways:

  1. Open your bash file, and add
    export TALISMAN_INTERACTIVE=true
    Don't forget to source the bash file for the variable to take effect!

  2. Alternatively, you can also invoke the interactive mode by using the CLI utility
    (for using pre-commit hook)
    talisman -i -g pre-commit

Note: If you use an IDE's Version Control integration for git operations, this feature will not work. You can still use the suggested filename and checksum to be entered in .talismanrc file manually.

Git history Scanner

You can now execute Talisman from CLI, and potentially add it to your CI/CD pipelines, to scan git history of your repository to find any sensitive content. This includes scanning of the files listed in the .talismanrc file as well.

Steps:

  1. Get into the git directory path to be scanned cd <directory to scan>
  2. Run the scan command talisman --scan
  • Running this command will create a folder named talisman_reports in the root of the current directory and store the report files there.
  • You can also specify the location for reports by providing an additional parameter as --reportdirectory or --rd
    For example, talisman --scan --reportdirectory=/Users/username/Desktop

You can use the other options to scan as given above.

Talisman currently does not support ignoring of files for scanning.

Checksum Calculator

Talisman Checksum calculator gives out yaml format which you can directly copy and paste in .talismanrc file in order to ignore particular file formats from talisman detectors.

To run the checksum please "cd" into the root of your repository and run the following command

For Example: talisman --checksum="*.pem *.txt"

  1. This command finds all the .pem files in the repository and calculates collective checksum of all those files and outputs a yaml format for .talismanrc. In the same way it deals with the .txt files.
  2. Multiple file names / patterns can be given with space separation.

Example output:

.talismanrc format for given file names / patterns
fileignoreconfig:
- filename: '*.pem'
  checksum: f731b26be086fd2647c40801630e2219ef207cb1aacc02f9bf0559a75c0855a4
  ignore_detectors: []
- filename: '*.txt'
  checksum: d9e9e94868d7de5b2a0706b8d38d0f79730839e0eb4de4e9a2a5a014c7c43f35
  ignore_detectors: []

Note: Checksum calculator considers the staged files while calculating the collective checksum of the files.

Talisman HTML Reporting

Powered by

Talisman CLI tool talisman also comes with the capability to provide detailed and sharable HTML report. Once you have installed Talisman, please follow the steps mentioned in talisman-html-report, to install the reporting package in .talisman folder. To generate the html report, run:

  • talisman --scanWithHtml

This will scan the repository and create a folder talisman_html_report under the scanned repository. We need to start an HTTP server inside this repository to access the report.Below is a recommended approach to start a HTTP server:

  • python -m SimpleHTTPServer <port> (eg: 8000)

You can now access the report by navigating to:

http://localhost:8000

Sample Screenshots

  • Welcome
  • Summary
  • Detailed Report
  • Error Report

Note: You don't have to start a server if you are running Talisman in CI or any other hosted environment

Uninstallation

The uninstallation process depends on how you had installed Talisman. You could have chosen to install as a global hook template or at a single repository.

Please follow the steps below based on which option you had chosen at installation.

Uninstallation from a global hook template

Run the following command on your terminal to uninstall talisman globally from your machine.

For pre-commit hook:

bash -c "$(curl --silent https://raw.githubusercontent.com/thoughtworks/talisman/main/global_install_scripts/uninstall.bash)"

For pre-push hook:

bash -c "$(curl --silent https://raw.githubusercontent.com/thoughtworks/talisman/main/global_install_scripts/uninstall.bash)" -- pre-push

This will

  1. ask you for the base dir of all your repos, find all git repos inside it and remove talisman hooks
  2. remove talisman hook from .git-template
  3. remove talisman from the central install location ($HOME/.talisman/bin).

You will have to manually remove TALISMAN_HOME from your environment variables

Uninstallation from a single repository

When you installed Talisman, it must have created a pre-commit or pre-push hook (as selected) in your repository during installation.

You can remove the hook manually by deleting the Talisman pre-commit or pre-push hook from .git/hooks folder in repository.

Contributing to Talisman

To contribute to Talisman, have a look at our contributing guide.