gitlab-secret_detection 0.38.2 → 0.39.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 72c744cde09e54fc5c31ccdeab76cc0dd2d149057e71e56f87a61837a5116a15
|
|
4
|
+
data.tar.gz: f4515d3c830d32313e9202b5c207edd7ae61f4eec0029d496b6dfac4a3f3f9f6
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 4d9d25c4b0f0a870807eddc82ebea5750e93afd77d8c02d42a63c06765c4481c1960cd5a04277a578933eb05b3be8ae39b1607c2c38eeb63f0ee7d594556b396
|
|
7
|
+
data.tar.gz: 6b39ed7017729a4cd28e8c203b79daa6709ef6309c96bea42b46d5e27cc8364bf9074d8d36c3bafdfc869e59a02306741bd2f2ade1d8553e42b52cb71e71a74f
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# rule-set version: 0.
|
|
1
|
+
# rule-set version: 0.21.1
|
|
2
2
|
# Rules are auto-generated. See https://gitlab.com/gitlab-org/security-products/secret-detection/secret-detection-rules for instructions on updating the rules.
|
|
3
3
|
[[rules]]
|
|
4
4
|
id = 'AdafruitIOKey'
|
|
@@ -189,15 +189,6 @@ remediation = "For general guidance on handling security incidents with regards
|
|
|
189
189
|
tags = ['gitlab_blocking']
|
|
190
190
|
keywords = ['ApiKey-v1']
|
|
191
191
|
|
|
192
|
-
[[rules]]
|
|
193
|
-
id = 'CircleCIPersonalAccessToken'
|
|
194
|
-
regex = '\bCCIPAT_[a-zA-Z0-9]{22}_[a-f0-9]{40}\b'
|
|
195
|
-
description = "A CircleCI personal access token was identified. Personal access tokens grant the same level of permissions as the user\nthat created the token. A malicious actor with access to this token can impersonate the user and gain access to all\nfeatures and services in CircleCI."
|
|
196
|
-
title = 'CircleCI Personal Access Token'
|
|
197
|
-
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\nFor rotating a Personal Access token:\n\n- In the CircleCI application, go to your User settings.\n- Select \"Personal API Tokens\".\n- Select \"X\" in the Remove column for the token you wish to replace and confirm your deletion.\n- Select \"Create New Token\".\n- In the Token name field, type a new name for the old token you are rotating. It can be the same name given to the old\n token.\n- Select \"Add API Token\".\n- After the token appears, copy and paste it to another location. It is not possible to view the token again.\n\nFor more information please see their [documentation on rotating personal access tokens](https://circleci.com/docs/managing-api-tokens/#rotating-a-personal-api-token)."
|
|
198
|
-
tags = ['gitlab_blocking']
|
|
199
|
-
keywords = ['CCIPAT_']
|
|
200
|
-
|
|
201
192
|
[[rules]]
|
|
202
193
|
id = 'ContentfulPersonalAccessToken'
|
|
203
194
|
regex = '\bCFPAT-([a-zA-Z0-9_\-]){43}\b'
|
|
@@ -568,11 +559,11 @@ tags = ['gitlab_blocking']
|
|
|
568
559
|
keywords = ['hf_']
|
|
569
560
|
|
|
570
561
|
[[rules]]
|
|
571
|
-
id = '
|
|
572
|
-
regex = '\bdG9rO[0-9A-Za-z]{
|
|
573
|
-
description = "An Intercom
|
|
574
|
-
title = 'Intercom
|
|
575
|
-
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab
|
|
562
|
+
id = 'Intercom API token'
|
|
563
|
+
regex = '\bdG9rO(?:[0-9A-Za-z]{55}\b|[0-9A-Za-z]{54}=|[0-9A-Za-z]{53}==)'
|
|
564
|
+
description = "An Intercom API Token was detected. These tokens provide direct API access to your Intercom workspace and can\nbe either personal access tokens or app-level access tokens. A malicious actor with access to this token could\nread customer conversations, access user data, send messages, modify workspace settings, and perform other\nactions based on the token's permission scope."
|
|
565
|
+
title = 'Intercom API Token'
|
|
566
|
+
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab\ndocumentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\nTo revoke your Intercom API Token:\n\n1. Log in to your [Intercom workspace](https://app.intercom.com/)\n2. Navigate to Settings by clicking the gear icon in the bottom-left corner\n3. Select \"Developers\" from the settings menu, then choose \"Developer Hub\"\n4. Click on \"Your Apps\" and select the app associated with the compromised token\n5. In the \"Authentication\" section, locate the access token that was compromised\n6. Click \"Revoke\" next to the compromised token to immediately invalidate it\n7. Generate a new access token by clicking \"Create access token\" or \"New access token\"\n8. Update all applications, services, and integrations with the new token\n9. Test API calls to verify the new token works correctly and the old token is invalid\n\nFor detailed information on managing Intercom API tokens, please see the\n[Intercom API Authentication Documentation](https://developers.intercom.com/docs/build-an-integration/learn-more/authentication/)."
|
|
576
567
|
tags = ['gitlab_blocking']
|
|
577
568
|
keywords = ['dG9rO']
|
|
578
569
|
|
|
@@ -704,7 +695,7 @@ keywords = ['api_live']
|
|
|
704
695
|
|
|
705
696
|
[[rules]]
|
|
706
697
|
id = 'OpenAiProjectKey'
|
|
707
|
-
regex = '\bsk-proj-[a-zA-Z0-9_-]{
|
|
698
|
+
regex = '\bsk-proj-[a-zA-Z0-9_-]{40,190}\b'
|
|
708
699
|
description = "An OpenAI project API key was identified. A project key can be used for programmatic access to OpenAI's API. A malicious\nactor with access to this key can execute functionality on behalf of the user who created the key."
|
|
709
700
|
title = 'OpenAI project key'
|
|
710
701
|
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\nTo revoke Open AI project API key:\n\n- Sign in to your OpenAI account and visit <https://platform.openai.com/settings/>\n- On the left-hand side menu, select \"API Keys\" under \"Project\"\n- Find the key that was identified, and select the red trash icon on the right-hand side.\n- When prompted, select \"Revoke key\" in the \"Revoke secret key\" dialog\n\nFor more information, please see [OpenAI's documentation on project API keys](https://platform.openai.com/docs/api-reference/project-api-keys)."
|
|
@@ -713,7 +704,7 @@ keywords = ['sk-proj-']
|
|
|
713
704
|
|
|
714
705
|
[[rules]]
|
|
715
706
|
id = 'OpenAiServiceAccountKey'
|
|
716
|
-
regex = '\bsk-svcacct-[a-zA-Z0-9_-]{
|
|
707
|
+
regex = '\bsk-svcacct-[a-zA-Z0-9_-]{40,190}\b'
|
|
717
708
|
description = "An OpenAI service account key was identified. A service account key can be used for programmatic access to OpenAI's API.\nA malicious actor with access to this key can execute functionality on behalf of the user who created the key."
|
|
718
709
|
title = 'OpenAI service account key'
|
|
719
710
|
remediation = "For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on\n[Credential exposure to the internet](https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#credential-exposure-to-public-internet).\n\n- Sign in to your OpenAI account and visit <https://platform.openai.com/settings/>\n- On the left-hand side menu, select \"API Keys\" under \"Organization\"\n- Find the key that was identified, and select the red trash icon on the right-hand side.\n- When prompted, select \"Revoke key\" in the \"Revoke secret key\" dialog\n\nFor more information, please see [OpenAI's documentation on project service accounts](https://platform.openai.com/docs/api-reference/project-service-accounts)."
|
|
@@ -5,7 +5,7 @@ module Gitlab
|
|
|
5
5
|
class Gem
|
|
6
6
|
# Ensure to maintain the same version in CHANGELOG file.
|
|
7
7
|
# More details available under 'Release Process' section in the README.md file.
|
|
8
|
-
VERSION = "0.
|
|
8
|
+
VERSION = "0.39.0"
|
|
9
9
|
|
|
10
10
|
# SD_ENV env var is used to determine which environment the
|
|
11
11
|
# server is running. This var is defined in `.runway/env-<env>.yml` files.
|
metadata
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: gitlab-secret_detection
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.
|
|
4
|
+
version: 0.39.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- group::secret detection
|
|
@@ -10,7 +10,7 @@ authors:
|
|
|
10
10
|
autorequire:
|
|
11
11
|
bindir: bin
|
|
12
12
|
cert_chain: []
|
|
13
|
-
date: 2025-
|
|
13
|
+
date: 2025-12-01 00:00:00.000000000 Z
|
|
14
14
|
dependencies:
|
|
15
15
|
- !ruby/object:Gem::Dependency
|
|
16
16
|
name: grpc
|