gitlab-secret_detection 0.14.0 → 0.14.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/gitlab/secret_detection/core/secret_push_protection_rules.toml +223 -0
- metadata +3 -3
- data/lib/gitlab.rb +0 -6
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6e705b3e254f6972c25d7f6ef1b9bcbc21a2571bdc861001b3e3bab7999b03ad
|
4
|
+
data.tar.gz: dd47048712bc544fc74d86ed927e4abc9f690253454561f07cb2afabcdcef7e4
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 97564ccb6513e7ef41482b52c331c8c04759d968015364e5bb345ace5fab446b6938950ee9b5941adc3603bd7da7aaf144747ad572a368b4fca1970110f8de15
|
7
|
+
data.tar.gz: c424885c5629f8bc78356db53950830aa9df9cbbee238fb8901f80670d13716b16badc7c72998179a54dd24cdb2885246c46dd82c95250ba19f2cb46ea44ce50
|
@@ -0,0 +1,223 @@
|
|
1
|
+
# rule-set version: 0.3.0
|
2
|
+
# Rules are auto-generated. See https://gitlab.com/gitlab-org/security-products/secret-detection/secret-detection-rules for instructions on updating the rules.
|
3
|
+
[[rules]]
|
4
|
+
description = "Anthropic keys"
|
5
|
+
id = "anthropic_key"
|
6
|
+
keywords = ["sk-ant-"]
|
7
|
+
regex = "\\b(sk-ant-[a-z]{3}\\d{2}-[A-Za-z0-9\\\\-_]{86}-[A-Za-z0-9\\\\-_]{8})(?:[[:punct:]]|[[:space:]]|[[:blank:]]|$)"
|
8
|
+
tags = ["gitlab_blocking"]
|
9
|
+
[[rules]]
|
10
|
+
description = "AWS Access Token"
|
11
|
+
id = "AWS"
|
12
|
+
keywords = ["AKIA"]
|
13
|
+
regex = "\\bAKIA[0-9A-Z]{16}\\b"
|
14
|
+
tags = ["aws", "revocation_type", "gitlab_blocking"]
|
15
|
+
[[rules]]
|
16
|
+
description = "GCP API keys can be misused to gain API quota from billed projects"
|
17
|
+
id = "GCP API key"
|
18
|
+
keywords = ["AIza"]
|
19
|
+
regex = "(?i)\\b(AIza[0-9A-Za-z-_]{35})(?:['|\\\"|\\n|\\r|\\s|\\x60|;]|$)"
|
20
|
+
secretGroup = 1
|
21
|
+
tags = ["gitlab_partner_token", "revocation_type", "gitlab_blocking"]
|
22
|
+
[[rules]]
|
23
|
+
description = "GCP OAuth client secrets can be misused to spoof your application"
|
24
|
+
id = "GCP OAuth client secret"
|
25
|
+
keywords = ["GOCSPX-"]
|
26
|
+
regex = "GOCSPX-[a-zA-Z0-9_-]{28}"
|
27
|
+
tags = ["gitlab_partner_token", "revocation_type", "gitlab_blocking"]
|
28
|
+
[[rules]]
|
29
|
+
description = "Google (GCP) Service-account"
|
30
|
+
id = "Google (GCP) Service-account"
|
31
|
+
keywords = ["service_account"]
|
32
|
+
regex = "\\\"private_key\\\":\\s*\\\"-{5}BEGIN PRIVATE KEY-{5}[\\s\\S]*?\","
|
33
|
+
tags = ["gitlab_partner_token", "revocation_type", "gitlab_blocking"]
|
34
|
+
[[rules]]
|
35
|
+
description = "Github Personal Access Token"
|
36
|
+
id = "Github Personal Access Token"
|
37
|
+
keywords = ["ghp_"]
|
38
|
+
regex = "ghp_[0-9a-zA-Z]{36}"
|
39
|
+
tags = ["gitlab_blocking"]
|
40
|
+
[[rules]]
|
41
|
+
description = "Github OAuth Access Token"
|
42
|
+
id = "Github OAuth Access Token"
|
43
|
+
keywords = ["gho_"]
|
44
|
+
regex = "gho_[0-9a-zA-Z]{36}"
|
45
|
+
tags = ["gitlab_blocking"]
|
46
|
+
[[rules]]
|
47
|
+
description = "Github App Token"
|
48
|
+
id = "Github App Token"
|
49
|
+
keywords = ["ghu_", "ghs_"]
|
50
|
+
regex = "(ghu|ghs)_[0-9a-zA-Z]{36}"
|
51
|
+
tags = ["gitlab_blocking"]
|
52
|
+
[[rules]]
|
53
|
+
description = "Github Refresh Token"
|
54
|
+
id = "Github Refresh Token"
|
55
|
+
keywords = ["ghr_"]
|
56
|
+
regex = "ghr_[0-9a-zA-Z]{76}"
|
57
|
+
tags = ["gitlab_blocking"]
|
58
|
+
[[rules]]
|
59
|
+
description = "GitLab Personal Access Token"
|
60
|
+
id = "gitlab_personal_access_token"
|
61
|
+
keywords = ["glpat"]
|
62
|
+
regex = "\\b(glpat-[0-9a-zA-Z_\\-]{20})(?:[[:punct:]]|[[:space:]]|[[:blank:]]|$)"
|
63
|
+
tags = ["gitlab", "revocation_type", "gitlab_blocking"]
|
64
|
+
[[rules]]
|
65
|
+
description = "GitLab Pipeline Trigger Token"
|
66
|
+
id = "gitlab_pipeline_trigger_token"
|
67
|
+
keywords = ["glptt"]
|
68
|
+
regex = "\\b(glptt-[0-9a-zA-Z_\\-]{40})(?:[[:punct:]]|[[:space:]]|[[:blank:]]|$)"
|
69
|
+
tags = ["gitlab", "gitlab_blocking"]
|
70
|
+
[[rules]]
|
71
|
+
description = "GitLab Runner Registration Token"
|
72
|
+
id = "gitlab_runner_registration_token"
|
73
|
+
keywords = ["GR1348941"]
|
74
|
+
regex = "\\b(GR1348941[0-9a-zA-Z_\\-]{20})(?:[[:punct:]]|[[:space:]]|[[:blank:]]|$)"
|
75
|
+
tags = ["gitlab", "gitlab_blocking"]
|
76
|
+
[[rules]]
|
77
|
+
description = "GitLab Runner Authentication Token"
|
78
|
+
id = "gitlab_runner_auth_token"
|
79
|
+
keywords = ["glrt"]
|
80
|
+
regex = "\\b(glrt-[0-9a-zA-Z_\\-]{20})(?:[[:punct:]]|[[:space:]]|[[:blank:]]|$)"
|
81
|
+
tags = ["gitlab", "gitlab_blocking"]
|
82
|
+
[[rules]]
|
83
|
+
description = "GitLab OAuth Application Secrets"
|
84
|
+
id = "gitlab_oauth_app_secret"
|
85
|
+
keywords = ["gloas"]
|
86
|
+
regex = "\\b(gloas-[0-9a-zA-Z_\\-]{64})(?:[[:punct:]]|[[:space:]]|[[:blank:]]|$)"
|
87
|
+
tags = ["gitlab", "gitlab_blocking"]
|
88
|
+
[[rules]]
|
89
|
+
description = "GitLab Feed token"
|
90
|
+
id = "gitlab_feed_token_v2"
|
91
|
+
keywords = ["glft"]
|
92
|
+
regex = "\\b(glft-[0-9a-zA-Z_\\-]{20})(?:[[:punct:]]|[[:space:]]|[[:blank:]]|$)"
|
93
|
+
tags = ["gitlab", "gitlab_blocking"]
|
94
|
+
[[rules]]
|
95
|
+
description = "GitLab Agent for Kubernetes token"
|
96
|
+
id = "gitlab_kubernetes_agent_token"
|
97
|
+
keywords = ["glagent"]
|
98
|
+
regex = "\\b(glagent-[0-9a-zA-Z_\\-]{50})(?:[[:punct:]]|[[:space:]]|[[:blank:]]|$)"
|
99
|
+
tags = ["gitlab", "gitlab_blocking"]
|
100
|
+
[[rules]]
|
101
|
+
description = "GitLab Incoming email token"
|
102
|
+
id = "gitlab_incoming_email_token"
|
103
|
+
keywords = ["glimt"]
|
104
|
+
regex = "\\b(glimt-[0-9a-zA-Z_\\-]{25})(?:[[:punct:]]|[[:space:]]|[[:blank:]]|$)"
|
105
|
+
tags = ["gitlab", "gitlab_blocking"]
|
106
|
+
[[rules]]
|
107
|
+
description = "Grafana API token"
|
108
|
+
id = "Grafana API token"
|
109
|
+
keywords = ["grafana"]
|
110
|
+
regex = "['\\\"]eyJrIjoi(?i)[a-z0-9-_=]{72,92}['\\\"]"
|
111
|
+
tags = ["gitlab_blocking"]
|
112
|
+
[[rules]]
|
113
|
+
description = "Hashicorp Terraform user/org API token"
|
114
|
+
id = "Hashicorp Terraform user/org API token"
|
115
|
+
keywords = ["atlasv1", "hashicorp", "terraform"]
|
116
|
+
regex = "['\\\"](?i)[a-z0-9]{14}\\.atlasv1\\.[a-z0-9-_=]{60,70}['\\\"]"
|
117
|
+
tags = ["gitlab_blocking"]
|
118
|
+
[[rules]]
|
119
|
+
description = "Hashicorp Vault batch token"
|
120
|
+
id = "Hashicorp Vault batch token"
|
121
|
+
keywords = ["hashicorp", "AAAAAQ", "vault"]
|
122
|
+
regex = "b\\.AAAAAQ[0-9a-zA-Z_-]{156}"
|
123
|
+
tags = ["gitlab_blocking"]
|
124
|
+
[[rules]]
|
125
|
+
description = "Mailchimp API key"
|
126
|
+
id = "Mailchimp API key"
|
127
|
+
keywords = ["mailchimp"]
|
128
|
+
regex = "(?i)(mailchimp[a-z0-9_ .\\-,]{0,25})(=|>|:=|\\|\\|:|<=|=>|:).{0,5}['\\\"]([a-f0-9]{32}-us20)['\\\"]"
|
129
|
+
secretGroup = 3
|
130
|
+
tags = ["gitlab_blocking"]
|
131
|
+
[[rules]]
|
132
|
+
description = "Mailgun private API token"
|
133
|
+
id = "Mailgun private API token"
|
134
|
+
keywords = ["mailgun"]
|
135
|
+
regex = "(?i)(mailgun[a-z0-9_ .\\-,]{0,25})(=|>|:=|\\|\\|:|<=|=>|:).{0,5}['\\\"](key-[a-f0-9]{32})['\\\"]"
|
136
|
+
secretGroup = 3
|
137
|
+
tags = ["gitlab_blocking"]
|
138
|
+
[[rules]]
|
139
|
+
description = "Mailgun webhook signing key"
|
140
|
+
id = "Mailgun webhook signing key"
|
141
|
+
keywords = ["mailgun"]
|
142
|
+
regex = "(?i)(mailgun[a-z0-9_ .\\-,]{0,25})(=|>|:=|\\|\\|:|<=|=>|:).{0,5}['\\\"]([a-h0-9]{32}-[a-h0-9]{8}-[a-h0-9]{8})['\\\"]"
|
143
|
+
secretGroup = 3
|
144
|
+
tags = ["gitlab_blocking"]
|
145
|
+
[[rules]]
|
146
|
+
description = "New Relic user API Key"
|
147
|
+
id = "New Relic user API Key"
|
148
|
+
keywords = ["NRAK"]
|
149
|
+
regex = "['\\\"](NRAK-[A-Z0-9]{27})['\\\"]"
|
150
|
+
tags = ["gitlab_blocking"]
|
151
|
+
[[rules]]
|
152
|
+
description = "New Relic user API ID"
|
153
|
+
id = "New Relic user API ID"
|
154
|
+
keywords = ["newrelic"]
|
155
|
+
regex = "(?i)(newrelic[a-z0-9_ .\\-,]{0,25})(=|>|:=|\\|\\|:|<=|=>|:).{0,5}['\\\"]([A-Z0-9]{64})['\\\"]"
|
156
|
+
secretGroup = 3
|
157
|
+
tags = ["gitlab_blocking"]
|
158
|
+
[[rules]]
|
159
|
+
description = "npm access token"
|
160
|
+
id = "npm access token"
|
161
|
+
keywords = ["npm_"]
|
162
|
+
regex = "['\\\"](npm_(?i)[a-z0-9]{36})['\\\"]"
|
163
|
+
tags = ["gitlab_blocking"]
|
164
|
+
[[rules]]
|
165
|
+
description = "PyPI upload token"
|
166
|
+
id = "PyPI upload token"
|
167
|
+
keywords = ["pypi-AgEIcHlwaS5vcmc"]
|
168
|
+
regex = "pypi-AgEIcHlwaS5vcmc[A-Za-z0-9-_]{50,1000}"
|
169
|
+
tags = ["pypi", "revocation_type", "gitlab_blocking"]
|
170
|
+
[[rules]]
|
171
|
+
description = "Rubygem API token"
|
172
|
+
id = "Rubygem API token"
|
173
|
+
keywords = ["rubygems_"]
|
174
|
+
regex = "rubygems_[a-f0-9]{48}"
|
175
|
+
tags = ["gitlab_blocking"]
|
176
|
+
[[rules]]
|
177
|
+
description = "Segment Public API token"
|
178
|
+
id = "Segment Public API token"
|
179
|
+
keywords = ["sgp_"]
|
180
|
+
regex = "sgp_[a-zA-Z0-9]{64}"
|
181
|
+
tags = ["gitlab_blocking"]
|
182
|
+
[[rules]]
|
183
|
+
description = "Sendgrid API token"
|
184
|
+
id = "Sendgrid API token"
|
185
|
+
keywords = ["sendgrid"]
|
186
|
+
regex = "SG\\.(?i)[a-z0-9_\\-\\.]{66}"
|
187
|
+
tags = ["gitlab_blocking"]
|
188
|
+
[[rules]]
|
189
|
+
description = "Shopify shared secret"
|
190
|
+
id = "Shopify shared secret"
|
191
|
+
keywords = ["shpss_"]
|
192
|
+
regex = "shpss_[a-fA-F0-9]{32}"
|
193
|
+
tags = ["gitlab_blocking"]
|
194
|
+
[[rules]]
|
195
|
+
description = "Shopify access token"
|
196
|
+
id = "Shopify access token"
|
197
|
+
keywords = ["shpat_"]
|
198
|
+
regex = "shpat_[a-fA-F0-9]{32}"
|
199
|
+
tags = ["gitlab_blocking"]
|
200
|
+
[[rules]]
|
201
|
+
description = "Shopify custom app access token"
|
202
|
+
id = "Shopify custom app access token"
|
203
|
+
keywords = ["shpca_"]
|
204
|
+
regex = "shpca_[a-fA-F0-9]{32}"
|
205
|
+
tags = ["gitlab_blocking"]
|
206
|
+
[[rules]]
|
207
|
+
description = "Shopify private app access token"
|
208
|
+
id = "Shopify private app access token"
|
209
|
+
keywords = ["shppa_"]
|
210
|
+
regex = "shppa_[a-fA-F0-9]{32}"
|
211
|
+
tags = ["gitlab_blocking"]
|
212
|
+
[[rules]]
|
213
|
+
description = "Slack token"
|
214
|
+
id = "Slack token"
|
215
|
+
keywords = ["xoxb", "xoxa", "xoxp", "xoxr", "xoxs"]
|
216
|
+
regex = "xox[baprs]-([0-9a-zA-Z]{10,48})"
|
217
|
+
tags = ["gitlab_blocking"]
|
218
|
+
[[rules]]
|
219
|
+
description = "Stripe"
|
220
|
+
id = "Stripe"
|
221
|
+
keywords = ["sk_test", "pk_test", "sk_live", "pk_live"]
|
222
|
+
regex = "(?i)(sk|pk)_(test|live)_[0-9a-z]{10,32}"
|
223
|
+
tags = ["gitlab_blocking"]
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: gitlab-secret_detection
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.14.
|
4
|
+
version: 0.14.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- group::secret detection
|
@@ -10,7 +10,7 @@ authors:
|
|
10
10
|
autorequire:
|
11
11
|
bindir: bin
|
12
12
|
cert_chain: []
|
13
|
-
date: 2024-12-
|
13
|
+
date: 2024-12-18 00:00:00.000000000 Z
|
14
14
|
dependencies:
|
15
15
|
- !ruby/object:Gem::Dependency
|
16
16
|
name: grpc
|
@@ -96,13 +96,13 @@ files:
|
|
96
96
|
- LICENSE
|
97
97
|
- README.md
|
98
98
|
- config/log.rb
|
99
|
-
- lib/gitlab.rb
|
100
99
|
- lib/gitlab/secret_detection.rb
|
101
100
|
- lib/gitlab/secret_detection/core.rb
|
102
101
|
- lib/gitlab/secret_detection/core/finding.rb
|
103
102
|
- lib/gitlab/secret_detection/core/response.rb
|
104
103
|
- lib/gitlab/secret_detection/core/ruleset.rb
|
105
104
|
- lib/gitlab/secret_detection/core/scanner.rb
|
105
|
+
- lib/gitlab/secret_detection/core/secret_push_protection_rules.toml
|
106
106
|
- lib/gitlab/secret_detection/core/status.rb
|
107
107
|
- lib/gitlab/secret_detection/grpc.rb
|
108
108
|
- lib/gitlab/secret_detection/grpc/client/grpc_client.rb
|