gitlab-secret_detection 0.34.0 → 0.35.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 3e707b2adfcca14ad8ceef1cb0526ac37beb263a651bf2e68cc26cc3c24fa4e9
|
4
|
+
data.tar.gz: f420f5f314faea11ab9fadeabb41c32bf4f38ad355f6a345b93e9ada84a6adb9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cc25aabe9741cbfd1a3788f8310e0058a7f6df60991729d86dcd94015396d30db6b5863b8c6b97562dbb7f9d302b6112e558683e043a0eb8de886fc655a8b20f
|
7
|
+
data.tar.gz: badbbd9b472b6ed7c09718448abea3629713f4516d73a0a3f2c931eace7e8907db365738379b85be416769927b02c6998ec2d954a86abf5fc4c97f73591f84e7
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# rule-set version: 0.
|
1
|
+
# rule-set version: 0.16.0
|
2
2
|
# Rules are auto-generated. See https://gitlab.com/gitlab-org/security-products/secret-detection/secret-detection-rules for instructions on updating the rules.
|
3
3
|
[[rules]]
|
4
4
|
id = 'AdafruitIOKey'
|
@@ -83,19 +83,28 @@ keywords = ['ATCTT3xFfGN0']
|
|
83
83
|
|
84
84
|
[[rules]]
|
85
85
|
id = 'AWS'
|
86
|
-
regex = '\bAKIA[
|
86
|
+
regex = '\bAKIA[2-7A-Z]{16}\b'
|
87
87
|
description = "An AWS Access Token was detected. AWS Access Tokens are usually paired along with their secret key values. A malicious\nactor with access to this token can access AWS services with the same permissions as the user which generated the key,\nprovided they have access to both values."
|
88
88
|
title = 'AWS access token'
|
89
89
|
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\nTo delete an access key:\n\n- In the \"Access keys\" section, find the key that was identified\n- Select \"Actions\"\n- Select \"Delete\"\n- Follow the instructions in the dialog to first deactivate and then confirm the deletion\n\nFor information on how to manage and revoke access keys for AWS please see their [documentation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html#Using_CreateAccessKey)."
|
90
90
|
tags = ['aws', 'revocation_type', 'gitlab_blocking']
|
91
91
|
keywords = ['AKIA']
|
92
92
|
|
93
|
+
[[rules]]
|
94
|
+
id = 'AWSSTSKey'
|
95
|
+
regex = '\bASIA[2-7A-Z]{16}\b'
|
96
|
+
description = "An AWS Security Token Service (STS) Key is a temporary security credential that provides short-term access to\nAWS services. These tokens are created when an IAM role is assumed and typically expire within 1-12 hours. A\nmalicious actor with access to this token can perform any actions allowed by the assumed role's permissions\nuntil the token expires. STS tokens are often associated with the permanent credentials (IAM user or service)\nthat originally assumed the role."
|
97
|
+
title = 'AWSSTSKey'
|
98
|
+
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab\ndocumentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\n**Important**: STS tokens cannot be directly revoked or rotated. They will expire automatically, but immediate\naction is required to limit potential damage.\n\nFor detailed information on managing AWS STS Keys and IAM roles, please see the\n[AWS IAM User Guide](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html).\n\n**Note**: STS tokens expire automatically and cannot be directly revoked. Response efforts must focus on\nmonitoring, damage assessment, and preventing future unauthorized assumptions of the associated IAM role."
|
99
|
+
tags = ['gitlab_blocking']
|
100
|
+
keywords = ['ASIA']
|
101
|
+
|
93
102
|
[[rules]]
|
94
103
|
id = 'AzureEntraClientSecret'
|
95
|
-
regex = '\b[0-9A-Za-z]{3}8Q~[0-9A-Za-
|
96
|
-
description =
|
104
|
+
regex = '\b[0-9A-Za-z.\-_]{3}8Q~[0-9A-Za-z\-_.~]{34}\b'
|
105
|
+
description = "An Azure Entra (previously Active Directory) Client Secret is a confidential credential used\nby applications to authenticate with Microsoft Azure services and APIs. This secret is paired\nwith a Client ID to enable application-level access to Azure resources and Microsoft Graph APIs.\nA malicious actor with access to this client secret could impersonate the application, access\nprotected resources, and perform actions with the same permissions granted to the\napplication registration."
|
97
106
|
title = 'Azure Entra Client Secret'
|
98
|
-
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab
|
107
|
+
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab\ndocumentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\nTo rotate your Azure Entra Client Secret:\n\n1. Log in to the [Azure Portal](https://portal.azure.com)\n2. Navigate to \"Microsoft Entra ID\" (formerly Azure Active Directory)\n3. Select \"App registrations\" from the left navigation menu\n4. Find and select the application registration associated with the compromised client secret\n5. Go to \"Certificates & secrets\" in the application settings\n6. In the \"Client secrets\" section, create a new client secret before deleting the old one\n7. Update all applications, configuration files, and key vaults that reference the old client secret\n8. Delete the compromised client secret from the \"Client secrets\" section\n9. Test your applications to ensure they are functioning with the new client secret\n\nFor detailed information on managing Azure Entra Client Secrets, please see the\n[Microsoft Entra application registration documentation](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app)."
|
99
108
|
tags = ['gitlab_blocking']
|
100
109
|
keywords = ['8Q~']
|
101
110
|
|
@@ -103,19 +112,28 @@ keywords = ['8Q~']
|
|
103
112
|
id = 'AzureAPIManagementGatewayKey'
|
104
113
|
regex = 'GatewayKey [A-Za-z0-9_-]{3,64}&[0-9]{12}&[A-Za-z0-9+\/]{60,90}=='
|
105
114
|
description = "An Azure API Management Gateway Key was detected. These keys provide access to APIs\npublished through Azure API Management services and are tied to specific subscriptions and products. A\nmalicious actor with access to this key can consume APIs within the configured rate limits and access\npolicies, potentially leading to unauthorized data access, service abuse, or unexpected charges."
|
106
|
-
title = '
|
115
|
+
title = 'Azure API Management Gateway Key'
|
107
116
|
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab\ndocumentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\nTo regenerate your Azure API Management Gateway Key:\n\n1. Log in to the [Azure Portal](https://portal.azure.com)\n2. Navigate to your API Management service instance\n3. In the left menu, select \"Subscriptions\" under the \"APIs\" section\n4. Locate the compromised subscription by matching the key prefix or subscription name\n5. Click on the subscription name to open its details\n6. In the subscription details, click \"Regenerate primary key\" or \"Regenerate secondary key\"\n (regenerate the compromised key)\n7. Update all applications and clients that use this subscription key with the new key value\n8. Monitor API usage logs to verify the old key is no longer being used\n9. Consider temporarily disabling the subscription if immediate key rotation isn't possible\n\nFor detailed information on managing Azure API Management subscriptions and keys, please see the\n[Azure API Management documentation](https://docs.microsoft.com/en-us/azure/api-management/api-management-subscriptions)."
|
108
117
|
tags = ['gitlab_blocking']
|
109
118
|
keywords = ['GatewayKey']
|
110
119
|
|
111
120
|
[[rules]]
|
112
|
-
id = '
|
113
|
-
regex = '
|
114
|
-
description = "An Azure
|
115
|
-
title = '
|
116
|
-
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab\ndocumentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\nTo
|
121
|
+
id = 'AzureAppConfigConnectionString'
|
122
|
+
regex = '\.azconfig\.io;Id=[A-Za-z0-9+\/=:_-]{8,100};Secret=([A-Za-z0-9+\/~=]{32,88})'
|
123
|
+
description = "An Azure App Configuration Connection String was detected. This connection string provides access to an Azure\nApp Configuration store, which contains application settings and feature flags. A malicious actor with access to\nthis connection string could read sensitive configuration data, modify application settings, or manipulate\nfeature flags, potentially compromising application functionality and security."
|
124
|
+
title = 'Azure App Config Connection String'
|
125
|
+
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab\ndocumentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\nTo rotate your Azure App Configuration Connection String:\n\n1. Log in to the [Azure Portal](https://portal.azure.com)\n2. Navigate to \"Azure App Configuration\" from the left-hand menu or search for it in the search bar\n3. Select the specific App Configuration store that contains the compromised connection string\n4. In the left-hand menu, select \"Access keys\" under the \"Settings\" section\n5. Identify the compromised key (Primary or Secondary) and select \"Regenerate\" next to the appropriate key\n6. Copy the new connection string and update all applications, services, and configuration files that use this\n connection string\n7. Test your applications to ensure they can successfully connect using the new connection string\n8. Once verified, consider regenerating the other key as well for complete security\n\nFor detailed information on managing Azure App Configuration access keys, please see the\n[Azure App Configuration documentation](https://docs.microsoft.com/en-us/azure/azure-app-configuration/howto-disable-access-key-authentication)."
|
126
|
+
tags = ['gitlab_blocking']
|
127
|
+
keywords = ['.azconfig.io;Id=']
|
128
|
+
|
129
|
+
[[rules]]
|
130
|
+
id = 'AzureCommServicesConnectionString'
|
131
|
+
regex = '\.azure\.com\/;accesskey=([A-Za-z0-9+\/]{80,140}={0,2})'
|
132
|
+
description = "An Azure Communication Services connection string was detected. This connection string provides access to Azure\nCommunication Services resources including SMS, email, chat, voice calling, and video calling capabilities. A\nmalicious actor with access to this connection string could send unauthorized communications, access conversation\ndata, make unauthorized calls, or incur charges on your Azure account."
|
133
|
+
title = 'Azure Communication Services Connection String'
|
134
|
+
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab\ndocumentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\nTo rotate your Azure Communication Services Connection String:\n\n1. Log in to the [Azure Portal](https://portal.azure.com)\n2. Navigate to your Communication Services resource by searching for \"Communication Services\" in the top search bar\n3. Select your specific Communication Services resource from the list\n4. In the left navigation menu, select \"Keys\" under the \"Settings\" section\n5. Click \"Regenerate\" for either the Primary or Secondary key (regenerate the compromised key first)\n6. Copy the new connection string and update all applications, configuration files, and environment variables that\n use this credential\n7. Test your applications to ensure they can successfully connect with the new connection string\n8. After confirming everything works, regenerate the other key for complete security\n\nFor detailed information on managing Azure Communication Services Connection Strings, please see the\n[Azure Communication Services Keys documentation](https://docs.microsoft.com/en-us/azure/communication-services/quickstarts/create-communication-resource?tabs=windows&pivots=platform-azp#access-your-connection-strings-and-service-endpoints)."
|
117
135
|
tags = ['gitlab_blocking']
|
118
|
-
keywords = ['
|
136
|
+
keywords = ['.azure.com/;accesskey=']
|
119
137
|
|
120
138
|
[[rules]]
|
121
139
|
id = 'CDSCanadaNotifyAPIKey'
|
@@ -5,7 +5,7 @@ module Gitlab
|
|
5
5
|
class Gem
|
6
6
|
# Ensure to maintain the same version in CHANGELOG file.
|
7
7
|
# More details available under 'Release Process' section in the README.md file.
|
8
|
-
VERSION = "0.
|
8
|
+
VERSION = "0.35.1"
|
9
9
|
|
10
10
|
# SD_ENV env var is used to determine which environment the
|
11
11
|
# server is running. This var is defined in `.runway/env-<env>.yml` files.
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: gitlab-secret_detection
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.35.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- group::secret detection
|
@@ -10,7 +10,7 @@ authors:
|
|
10
10
|
autorequire:
|
11
11
|
bindir: bin
|
12
12
|
cert_chain: []
|
13
|
-
date: 2025-
|
13
|
+
date: 2025-10-07 00:00:00.000000000 Z
|
14
14
|
dependencies:
|
15
15
|
- !ruby/object:Gem::Dependency
|
16
16
|
name: grpc
|