agent-recon 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/hooks/send-event-wsl.py +339 -0
- package/.claude/hooks/send-event.py +334 -0
- package/CHANGELOG.md +66 -0
- package/CONTRIBUTING.md +70 -0
- package/EULA.md +223 -0
- package/INSTALL.md +193 -0
- package/LICENSE +287 -0
- package/LICENSE-COMMERCIAL +241 -0
- package/PRIVACY.md +115 -0
- package/README.md +182 -0
- package/SECURITY.md +63 -0
- package/TERMS.md +233 -0
- package/install-service.ps1 +302 -0
- package/installer/cli.js +177 -0
- package/installer/detect.js +355 -0
- package/installer/install.js +195 -0
- package/installer/manifest.js +140 -0
- package/installer/package.json +12 -0
- package/installer/steps/api-keys.js +59 -0
- package/installer/steps/directory.js +41 -0
- package/installer/steps/env-report.js +48 -0
- package/installer/steps/hooks.js +149 -0
- package/installer/steps/service.js +159 -0
- package/installer/steps/tls.js +104 -0
- package/installer/steps/verify.js +117 -0
- package/installer/steps/welcome.js +46 -0
- package/installer/ui.js +133 -0
- package/installer/uninstall.js +233 -0
- package/installer/upgrade.js +289 -0
- package/package.json +58 -0
- package/public/index.html +13953 -0
- package/server/fixtures/allowlist-profiles.json +185 -0
- package/server/package.json +34 -0
- package/server/platform.js +270 -0
- package/server/rules/gitleaks.toml +3214 -0
- package/server/rules/security.yara +579 -0
- package/server/start.js +178 -0
- package/service/agent-recon.service +30 -0
- package/service/com.agent-recon.server.plist +56 -0
- package/setup-linux.sh +259 -0
- package/setup-macos.sh +264 -0
- package/setup-wsl.sh +248 -0
- package/setup.ps1 +171 -0
- package/start-agent-recon.bat +4 -0
|
@@ -0,0 +1,3214 @@
|
|
|
1
|
+
# Gitleaks built-in rules snapshot — MIT license
|
|
2
|
+
# Source: https://github.com/gitleaks/gitleaks/blob/master/config/gitleaks.toml
|
|
3
|
+
# Fetched: 2026-03-11
|
|
4
|
+
# This file is a reference snapshot. Detection rules are translated into security.yara.
|
|
5
|
+
# To update: fetch the URL above, review the diff, translate new credential rules into security.yara.
|
|
6
|
+
# This file has been auto-generated. Do not edit manually.
|
|
7
|
+
# If you would like to contribute new rules, please use
|
|
8
|
+
# cmd/generate/config/main.go and follow the contributing guidelines
|
|
9
|
+
# at https://github.com/gitleaks/gitleaks/blob/master/CONTRIBUTING.md
|
|
10
|
+
#
|
|
11
|
+
# How the hell does secret scanning work? Read this:
|
|
12
|
+
# https://lookingatcomputer.substack.com/p/regex-is-almost-all-you-need
|
|
13
|
+
#
|
|
14
|
+
# This is the default gitleaks configuration file.
|
|
15
|
+
# Rules and allowlists are defined within this file.
|
|
16
|
+
# Rules instruct gitleaks on what should be considered a secret.
|
|
17
|
+
# Allowlists instruct gitleaks on what is allowed, i.e. not a secret.
|
|
18
|
+
|
|
19
|
+
title = "gitleaks config"
|
|
20
|
+
|
|
21
|
+
# minVersion indicates the minimum Gitleaks version required to use this config.
|
|
22
|
+
# If the running version is older, a warning will be logged and not all
|
|
23
|
+
# config-enabled features are guaranteed to work.
|
|
24
|
+
minVersion = "v8.25.0"
|
|
25
|
+
|
|
26
|
+
# TODO: change to [[allowlists]]
|
|
27
|
+
[allowlist]
|
|
28
|
+
description = "global allow lists"
|
|
29
|
+
paths = [
|
|
30
|
+
'''gitleaks\.toml''',
|
|
31
|
+
'''(?i)\.(?:bmp|gif|jpe?g|png|svg|tiff?)$''',
|
|
32
|
+
'''(?i)\.(?:eot|[ot]tf|woff2?)$''',
|
|
33
|
+
'''(?i)\.(?:docx?|xlsx?|pdf|bin|socket|vsidx|v2|suo|wsuo|.dll|pdb|exe|gltf)$''',
|
|
34
|
+
'''go\.(?:mod|sum|work(?:\.sum)?)$''',
|
|
35
|
+
'''(?:^|/)vendor/modules\.txt$''',
|
|
36
|
+
'''(?:^|/)vendor/(?:github\.com|golang\.org/x|google\.golang\.org|gopkg\.in|istio\.io|k8s\.io|sigs\.k8s\.io)(?:/.*)?$''',
|
|
37
|
+
'''(?:^|/)gradlew(?:\.bat)?$''',
|
|
38
|
+
'''(?:^|/)gradle\.lockfile$''',
|
|
39
|
+
'''(?:^|/)mvnw(?:\.cmd)?$''',
|
|
40
|
+
'''(?:^|/)\.mvn/wrapper/MavenWrapperDownloader\.java$''',
|
|
41
|
+
'''(?:^|/)node_modules(?:/.*)?$''',
|
|
42
|
+
'''(?:^|/)(?:deno\.lock|npm-shrinkwrap\.json|package-lock\.json|pnpm-lock\.yaml|yarn\.lock)$''',
|
|
43
|
+
'''(?:^|/)bower_components(?:/.*)?$''',
|
|
44
|
+
'''(?:^|/)(?:angular|bootstrap|jquery(?:-?ui)?|plotly|swagger-?ui)[a-zA-Z0-9.-]*(?:\.min)?\.js(?:\.map)?$''',
|
|
45
|
+
'''(?:^|/)javascript\.json$''',
|
|
46
|
+
'''(?:^|/)(?:Pipfile|poetry)\.lock$''',
|
|
47
|
+
'''(?i)(?:^|/)(?:v?env|virtualenv)/lib(?:64)?(?:/.*)?$''',
|
|
48
|
+
'''(?i)(?:^|/)(?:lib(?:64)?/python[23](?:\.\d{1,2})+|python/[23](?:\.\d{1,2})+/lib(?:64)?)(?:/.*)?$''',
|
|
49
|
+
'''(?i)(?:^|/)[a-z0-9_.]+-[0-9.]+\.dist-info(?:/.+)?$''',
|
|
50
|
+
'''(?:^|/)vendor/(?:bundle|ruby)(?:/.*?)?$''',
|
|
51
|
+
'''\.gem$''',
|
|
52
|
+
'''verification-metadata\.xml''',
|
|
53
|
+
'''Database.refactorlog''',
|
|
54
|
+
'''(?:^|/)\.git$''',
|
|
55
|
+
]
|
|
56
|
+
regexes = [
|
|
57
|
+
'''(?i)^true|false|null$''',
|
|
58
|
+
'''^(?i:a+|b+|c+|d+|e+|f+|g+|h+|i+|j+|k+|l+|m+|n+|o+|p+|q+|r+|s+|t+|u+|v+|w+|x+|y+|z+|\*+|\.+)$''',
|
|
59
|
+
'''^\$(?:\d+|{\d+})$''',
|
|
60
|
+
'''^\$(?:[A-Z_]+|[a-z_]+)$''',
|
|
61
|
+
'''^\${(?:[A-Z_]+|[a-z_]+)}$''',
|
|
62
|
+
'''^\{\{[ \t]*[\w ().|]+[ \t]*}}$''',
|
|
63
|
+
'''^\$\{\{[ \t]*(?:(?:env|github|secrets|vars)(?:\.[A-Za-z]\w+)+[\w "'&./=|]*)[ \t]*}}$''',
|
|
64
|
+
'''^%(?:[A-Z_]+|[a-z_]+)%$''',
|
|
65
|
+
'''^%[+\-# 0]?[bcdeEfFgGoOpqstTUvxX]$''',
|
|
66
|
+
'''^\{\d{0,2}}$''',
|
|
67
|
+
'''^@(?:[A-Z_]+|[a-z_]+)@$''',
|
|
68
|
+
'''^/Users/(?i)[a-z0-9]+/[\w .-/]+$''',
|
|
69
|
+
'''^/(?:bin|etc|home|opt|tmp|usr|var)/[\w ./-]+$''',
|
|
70
|
+
]
|
|
71
|
+
stopwords = [
|
|
72
|
+
"014df517-39d1-4453-b7b3-9930c563627c",
|
|
73
|
+
"abcdefghijklmnopqrstuvwxyz",
|
|
74
|
+
]
|
|
75
|
+
|
|
76
|
+
[[rules]]
|
|
77
|
+
id = "1password-secret-key"
|
|
78
|
+
description = "Uncovered a possible 1Password secret key, potentially compromising access to secrets in vaults."
|
|
79
|
+
regex = '''\bA3-[A-Z0-9]{6}-(?:(?:[A-Z0-9]{11})|(?:[A-Z0-9]{6}-[A-Z0-9]{5}))-[A-Z0-9]{5}-[A-Z0-9]{5}-[A-Z0-9]{5}\b'''
|
|
80
|
+
entropy = 3.8
|
|
81
|
+
keywords = ["a3-"]
|
|
82
|
+
|
|
83
|
+
[[rules]]
|
|
84
|
+
id = "1password-service-account-token"
|
|
85
|
+
description = "Uncovered a possible 1Password service account token, potentially compromising access to secrets in vaults."
|
|
86
|
+
regex = '''ops_eyJ[a-zA-Z0-9+/]{250,}={0,3}'''
|
|
87
|
+
entropy = 4
|
|
88
|
+
keywords = ["ops_"]
|
|
89
|
+
|
|
90
|
+
[[rules]]
|
|
91
|
+
id = "adafruit-api-key"
|
|
92
|
+
description = "Identified a potential Adafruit API Key, which could lead to unauthorized access to Adafruit services and sensitive data exposure."
|
|
93
|
+
regex = '''(?i)[\w.-]{0,50}?(?:adafruit)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9_-]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
94
|
+
keywords = ["adafruit"]
|
|
95
|
+
|
|
96
|
+
[[rules]]
|
|
97
|
+
id = "adobe-client-id"
|
|
98
|
+
description = "Detected a pattern that resembles an Adobe OAuth Web Client ID, posing a risk of compromised Adobe integrations and data breaches."
|
|
99
|
+
regex = '''(?i)[\w.-]{0,50}?(?:adobe)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
100
|
+
entropy = 2
|
|
101
|
+
keywords = ["adobe"]
|
|
102
|
+
|
|
103
|
+
[[rules]]
|
|
104
|
+
id = "adobe-client-secret"
|
|
105
|
+
description = "Discovered a potential Adobe Client Secret, which, if exposed, could allow unauthorized Adobe service access and data manipulation."
|
|
106
|
+
regex = '''\b(p8e-(?i)[a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
107
|
+
entropy = 2
|
|
108
|
+
keywords = ["p8e-"]
|
|
109
|
+
|
|
110
|
+
[[rules]]
|
|
111
|
+
id = "age-secret-key"
|
|
112
|
+
description = "Discovered a potential Age encryption tool secret key, risking data decryption and unauthorized access to sensitive information."
|
|
113
|
+
regex = '''AGE-SECRET-KEY-1[QPZRY9X8GF2TVDW0S3JN54KHCE6MUA7L]{58}'''
|
|
114
|
+
keywords = ["age-secret-key-1"]
|
|
115
|
+
|
|
116
|
+
[[rules]]
|
|
117
|
+
id = "airtable-api-key"
|
|
118
|
+
description = "Uncovered a possible Airtable API Key, potentially compromising database access and leading to data leakage or alteration."
|
|
119
|
+
regex = '''(?i)[\w.-]{0,50}?(?:airtable)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{17})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
120
|
+
keywords = ["airtable"]
|
|
121
|
+
|
|
122
|
+
[[rules]]
|
|
123
|
+
id = "airtable-personnal-access-token"
|
|
124
|
+
description = "Uncovered a possible Airtable Personal AccessToken, potentially compromising database access and leading to data leakage or alteration."
|
|
125
|
+
regex = '''\b(pat[[:alnum:]]{14}\.[a-f0-9]{64})\b'''
|
|
126
|
+
keywords = ["airtable"]
|
|
127
|
+
|
|
128
|
+
[[rules]]
|
|
129
|
+
id = "algolia-api-key"
|
|
130
|
+
description = "Identified an Algolia API Key, which could result in unauthorized search operations and data exposure on Algolia-managed platforms."
|
|
131
|
+
regex = '''(?i)[\w.-]{0,50}?(?:algolia)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
132
|
+
keywords = ["algolia"]
|
|
133
|
+
|
|
134
|
+
[[rules]]
|
|
135
|
+
id = "alibaba-access-key-id"
|
|
136
|
+
description = "Detected an Alibaba Cloud AccessKey ID, posing a risk of unauthorized cloud resource access and potential data compromise."
|
|
137
|
+
regex = '''\b(LTAI(?i)[a-z0-9]{20})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
138
|
+
entropy = 2
|
|
139
|
+
keywords = ["ltai"]
|
|
140
|
+
|
|
141
|
+
[[rules]]
|
|
142
|
+
id = "alibaba-secret-key"
|
|
143
|
+
description = "Discovered a potential Alibaba Cloud Secret Key, potentially allowing unauthorized operations and data access within Alibaba Cloud."
|
|
144
|
+
regex = '''(?i)[\w.-]{0,50}?(?:alibaba)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{30})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
145
|
+
entropy = 2
|
|
146
|
+
keywords = ["alibaba"]
|
|
147
|
+
|
|
148
|
+
[[rules]]
|
|
149
|
+
id = "anthropic-admin-api-key"
|
|
150
|
+
description = "Detected an Anthropic Admin API Key, risking unauthorized access to administrative functions and sensitive AI model configurations."
|
|
151
|
+
regex = '''\b(sk-ant-admin01-[a-zA-Z0-9_\-]{93}AA)(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
152
|
+
keywords = ["sk-ant-admin01"]
|
|
153
|
+
|
|
154
|
+
[[rules]]
|
|
155
|
+
id = "anthropic-api-key"
|
|
156
|
+
description = "Identified an Anthropic API Key, which may compromise AI assistant integrations and expose sensitive data to unauthorized access."
|
|
157
|
+
regex = '''\b(sk-ant-api03-[a-zA-Z0-9_\-]{93}AA)(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
158
|
+
keywords = ["sk-ant-api03"]
|
|
159
|
+
|
|
160
|
+
[[rules]]
|
|
161
|
+
id = "artifactory-api-key"
|
|
162
|
+
description = "Detected an Artifactory api key, posing a risk unauthorized access to the central repository."
|
|
163
|
+
regex = '''\bAKCp[A-Za-z0-9]{69}\b'''
|
|
164
|
+
entropy = 4.5
|
|
165
|
+
keywords = ["akcp"]
|
|
166
|
+
|
|
167
|
+
[[rules]]
|
|
168
|
+
id = "artifactory-reference-token"
|
|
169
|
+
description = "Detected an Artifactory reference token, posing a risk of impersonation and unauthorized access to the central repository."
|
|
170
|
+
regex = '''\bcmVmd[A-Za-z0-9]{59}\b'''
|
|
171
|
+
entropy = 4.5
|
|
172
|
+
keywords = ["cmvmd"]
|
|
173
|
+
|
|
174
|
+
[[rules]]
|
|
175
|
+
id = "asana-client-id"
|
|
176
|
+
description = "Discovered a potential Asana Client ID, risking unauthorized access to Asana projects and sensitive task information."
|
|
177
|
+
regex = '''(?i)[\w.-]{0,50}?(?:asana)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9]{16})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
178
|
+
keywords = ["asana"]
|
|
179
|
+
|
|
180
|
+
[[rules]]
|
|
181
|
+
id = "asana-client-secret"
|
|
182
|
+
description = "Identified an Asana Client Secret, which could lead to compromised project management integrity and unauthorized access."
|
|
183
|
+
regex = '''(?i)[\w.-]{0,50}?(?:asana)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
184
|
+
keywords = ["asana"]
|
|
185
|
+
|
|
186
|
+
[[rules]]
|
|
187
|
+
id = "atlassian-api-token"
|
|
188
|
+
description = "Detected an Atlassian API token, posing a threat to project management and collaboration tool security and data confidentiality."
|
|
189
|
+
regex = '''(?i)[\w.-]{0,50}?(?:(?-i:ATLASSIAN|[Aa]tlassian)|(?-i:CONFLUENCE|[Cc]onfluence)|(?-i:JIRA|[Jj]ira))(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{20}[a-f0-9]{4})(?:[\x60'"\s;]|\\[nr]|$)|\b(ATATT3[A-Za-z0-9_\-=]{186})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
190
|
+
entropy = 3.5
|
|
191
|
+
keywords = [
|
|
192
|
+
"atlassian",
|
|
193
|
+
"confluence",
|
|
194
|
+
"jira",
|
|
195
|
+
"atatt3",
|
|
196
|
+
]
|
|
197
|
+
|
|
198
|
+
[[rules]]
|
|
199
|
+
id = "authress-service-client-access-key"
|
|
200
|
+
description = "Uncovered a possible Authress Service Client Access Key, which may compromise access control services and sensitive data."
|
|
201
|
+
regex = '''\b((?:sc|ext|scauth|authress)_(?i)[a-z0-9]{5,30}\.[a-z0-9]{4,6}\.(?-i:acc)[_-][a-z0-9-]{10,32}\.[a-z0-9+/_=-]{30,120})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
202
|
+
entropy = 2
|
|
203
|
+
keywords = [
|
|
204
|
+
"sc_",
|
|
205
|
+
"ext_",
|
|
206
|
+
"scauth_",
|
|
207
|
+
"authress_",
|
|
208
|
+
]
|
|
209
|
+
|
|
210
|
+
[[rules]]
|
|
211
|
+
id = "aws-access-token"
|
|
212
|
+
description = "Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms."
|
|
213
|
+
regex = '''\b((?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z2-7]{16})\b'''
|
|
214
|
+
entropy = 3
|
|
215
|
+
keywords = [
|
|
216
|
+
"a3t",
|
|
217
|
+
"akia",
|
|
218
|
+
"asia",
|
|
219
|
+
"abia",
|
|
220
|
+
"acca",
|
|
221
|
+
]
|
|
222
|
+
[[rules.allowlists]]
|
|
223
|
+
regexes = [
|
|
224
|
+
'''.+EXAMPLE$''',
|
|
225
|
+
]
|
|
226
|
+
|
|
227
|
+
[[rules]]
|
|
228
|
+
id = "aws-amazon-bedrock-api-key-long-lived"
|
|
229
|
+
description = "Identified a pattern that may indicate long-lived Amazon Bedrock API keys, risking unauthorized Amazon Bedrock usage"
|
|
230
|
+
regex = '''\b(ABSK[A-Za-z0-9+/]{109,269}={0,2})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
231
|
+
entropy = 3
|
|
232
|
+
keywords = ["absk"]
|
|
233
|
+
|
|
234
|
+
[[rules]]
|
|
235
|
+
id = "aws-amazon-bedrock-api-key-short-lived"
|
|
236
|
+
description = "Identified a pattern that may indicate short-lived Amazon Bedrock API keys, risking unauthorized Amazon Bedrock usage"
|
|
237
|
+
regex = '''bedrock-api-key-YmVkcm9jay5hbWF6b25hd3MuY29t'''
|
|
238
|
+
entropy = 3
|
|
239
|
+
keywords = ["bedrock-api-key-"]
|
|
240
|
+
|
|
241
|
+
[[rules]]
|
|
242
|
+
id = "azure-ad-client-secret"
|
|
243
|
+
description = "Azure AD Client Secret"
|
|
244
|
+
regex = '''(?:^|[\\'"\x60\s>=:(,)])([a-zA-Z0-9_~.]{3}\dQ~[a-zA-Z0-9_~.-]{31,34})(?:$|[\\'"\x60\s<),])'''
|
|
245
|
+
entropy = 3
|
|
246
|
+
keywords = ["q~"]
|
|
247
|
+
|
|
248
|
+
[[rules]]
|
|
249
|
+
id = "beamer-api-token"
|
|
250
|
+
description = "Detected a Beamer API token, potentially compromising content management and exposing sensitive notifications and updates."
|
|
251
|
+
regex = '''(?i)[\w.-]{0,50}?(?:beamer)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(b_[a-z0-9=_\-]{44})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
252
|
+
keywords = ["beamer"]
|
|
253
|
+
|
|
254
|
+
[[rules]]
|
|
255
|
+
id = "bitbucket-client-id"
|
|
256
|
+
description = "Discovered a potential Bitbucket Client ID, risking unauthorized repository access and potential codebase exposure."
|
|
257
|
+
regex = '''(?i)[\w.-]{0,50}?(?:bitbucket)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
258
|
+
keywords = ["bitbucket"]
|
|
259
|
+
|
|
260
|
+
[[rules]]
|
|
261
|
+
id = "bitbucket-client-secret"
|
|
262
|
+
description = "Discovered a potential Bitbucket Client Secret, posing a risk of compromised code repositories and unauthorized access."
|
|
263
|
+
regex = '''(?i)[\w.-]{0,50}?(?:bitbucket)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9=_\-]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
264
|
+
keywords = ["bitbucket"]
|
|
265
|
+
|
|
266
|
+
[[rules]]
|
|
267
|
+
id = "bittrex-access-key"
|
|
268
|
+
description = "Identified a Bittrex Access Key, which could lead to unauthorized access to cryptocurrency trading accounts and financial loss."
|
|
269
|
+
regex = '''(?i)[\w.-]{0,50}?(?:bittrex)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
270
|
+
keywords = ["bittrex"]
|
|
271
|
+
|
|
272
|
+
[[rules]]
|
|
273
|
+
id = "bittrex-secret-key"
|
|
274
|
+
description = "Detected a Bittrex Secret Key, potentially compromising cryptocurrency transactions and financial security."
|
|
275
|
+
regex = '''(?i)[\w.-]{0,50}?(?:bittrex)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
276
|
+
keywords = ["bittrex"]
|
|
277
|
+
|
|
278
|
+
[[rules]]
|
|
279
|
+
id = "cisco-meraki-api-key"
|
|
280
|
+
description = "Cisco Meraki is a cloud-managed IT solution that provides networking, security, and device management through an easy-to-use interface."
|
|
281
|
+
regex = '''[\w.-]{0,50}?(?i:[\w.-]{0,50}?(?:(?-i:[Mm]eraki|MERAKI))(?:[ \t\w.-]{0,20})[\s'"]{0,3})(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9a-f]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
282
|
+
entropy = 3
|
|
283
|
+
keywords = ["meraki"]
|
|
284
|
+
|
|
285
|
+
[[rules]]
|
|
286
|
+
id = "clickhouse-cloud-api-secret-key"
|
|
287
|
+
description = "Identified a pattern that may indicate clickhouse cloud API secret key, risking unauthorized clickhouse cloud api access and data breaches on ClickHouse Cloud platforms."
|
|
288
|
+
regex = '''\b(4b1d[A-Za-z0-9]{38})\b'''
|
|
289
|
+
entropy = 3
|
|
290
|
+
keywords = ["4b1d"]
|
|
291
|
+
|
|
292
|
+
[[rules]]
|
|
293
|
+
id = "clojars-api-token"
|
|
294
|
+
description = "Uncovered a possible Clojars API token, risking unauthorized access to Clojure libraries and potential code manipulation."
|
|
295
|
+
regex = '''(?i)CLOJARS_[a-z0-9]{60}'''
|
|
296
|
+
entropy = 2
|
|
297
|
+
keywords = ["clojars_"]
|
|
298
|
+
|
|
299
|
+
[[rules]]
|
|
300
|
+
id = "cloudflare-api-key"
|
|
301
|
+
description = "Detected a Cloudflare API Key, potentially compromising cloud application deployments and operational security."
|
|
302
|
+
regex = '''(?i)[\w.-]{0,50}?(?:cloudflare)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9_-]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
303
|
+
entropy = 2
|
|
304
|
+
keywords = ["cloudflare"]
|
|
305
|
+
|
|
306
|
+
[[rules]]
|
|
307
|
+
id = "cloudflare-global-api-key"
|
|
308
|
+
description = "Detected a Cloudflare Global API Key, potentially compromising cloud application deployments and operational security."
|
|
309
|
+
regex = '''(?i)[\w.-]{0,50}?(?:cloudflare)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{37})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
310
|
+
entropy = 2
|
|
311
|
+
keywords = ["cloudflare"]
|
|
312
|
+
|
|
313
|
+
[[rules]]
|
|
314
|
+
id = "cloudflare-origin-ca-key"
|
|
315
|
+
description = "Detected a Cloudflare Origin CA Key, potentially compromising cloud application deployments and operational security."
|
|
316
|
+
regex = '''\b(v1\.0-[a-f0-9]{24}-[a-f0-9]{146})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
317
|
+
entropy = 2
|
|
318
|
+
keywords = [
|
|
319
|
+
"cloudflare",
|
|
320
|
+
"v1.0-",
|
|
321
|
+
]
|
|
322
|
+
|
|
323
|
+
[[rules]]
|
|
324
|
+
id = "codecov-access-token"
|
|
325
|
+
description = "Found a pattern resembling a Codecov Access Token, posing a risk of unauthorized access to code coverage reports and sensitive data."
|
|
326
|
+
regex = '''(?i)[\w.-]{0,50}?(?:codecov)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
327
|
+
keywords = ["codecov"]
|
|
328
|
+
|
|
329
|
+
[[rules]]
|
|
330
|
+
id = "cohere-api-token"
|
|
331
|
+
description = "Identified a Cohere Token, posing a risk of unauthorized access to AI services and data manipulation."
|
|
332
|
+
regex = '''[\w.-]{0,50}?(?i:[\w.-]{0,50}?(?:cohere|CO_API_KEY)(?:[ \t\w.-]{0,20})[\s'"]{0,3})(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-zA-Z0-9]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
333
|
+
entropy = 4
|
|
334
|
+
keywords = [
|
|
335
|
+
"cohere",
|
|
336
|
+
"co_api_key",
|
|
337
|
+
]
|
|
338
|
+
|
|
339
|
+
[[rules]]
|
|
340
|
+
id = "coinbase-access-token"
|
|
341
|
+
description = "Detected a Coinbase Access Token, posing a risk of unauthorized access to cryptocurrency accounts and financial transactions."
|
|
342
|
+
regex = '''(?i)[\w.-]{0,50}?(?:coinbase)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9_-]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
343
|
+
keywords = ["coinbase"]
|
|
344
|
+
|
|
345
|
+
[[rules]]
|
|
346
|
+
id = "confluent-access-token"
|
|
347
|
+
description = "Identified a Confluent Access Token, which could compromise access to streaming data platforms and sensitive data flow."
|
|
348
|
+
regex = '''(?i)[\w.-]{0,50}?(?:confluent)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{16})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
349
|
+
keywords = ["confluent"]
|
|
350
|
+
|
|
351
|
+
[[rules]]
|
|
352
|
+
id = "confluent-secret-key"
|
|
353
|
+
description = "Found a Confluent Secret Key, potentially risking unauthorized operations and data access within Confluent services."
|
|
354
|
+
regex = '''(?i)[\w.-]{0,50}?(?:confluent)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
355
|
+
keywords = ["confluent"]
|
|
356
|
+
|
|
357
|
+
[[rules]]
|
|
358
|
+
id = "contentful-delivery-api-token"
|
|
359
|
+
description = "Discovered a Contentful delivery API token, posing a risk to content management systems and data integrity."
|
|
360
|
+
regex = '''(?i)[\w.-]{0,50}?(?:contentful)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9=_\-]{43})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
361
|
+
keywords = ["contentful"]
|
|
362
|
+
|
|
363
|
+
[[rules]]
|
|
364
|
+
id = "curl-auth-header"
|
|
365
|
+
description = "Discovered a potential authorization token provided in a curl command header, which could compromise the curl accessed resource."
|
|
366
|
+
regex = '''\bcurl\b(?:.*?|.*?(?:[\r\n]{1,2}.*?){1,5})[ \t\n\r](?:-H|--header)(?:=|[ \t]{0,5})(?:"(?i)(?:Authorization:[ \t]{0,5}(?:Basic[ \t]([a-z0-9+/]{8,}={0,3})|(?:Bearer|(?:Api-)?Token)[ \t]([\w=~@.+/-]{8,})|([\w=~@.+/-]{8,}))|(?:(?:X-(?:[a-z]+-)?)?(?:Api-?)?(?:Key|Token)):[ \t]{0,5}([\w=~@.+/-]{8,}))"|'(?i)(?:Authorization:[ \t]{0,5}(?:Basic[ \t]([a-z0-9+/]{8,}={0,3})|(?:Bearer|(?:Api-)?Token)[ \t]([\w=~@.+/-]{8,})|([\w=~@.+/-]{8,}))|(?:(?:X-(?:[a-z]+-)?)?(?:Api-?)?(?:Key|Token)):[ \t]{0,5}([\w=~@.+/-]{8,}))')(?:\B|\s|\z)'''
|
|
367
|
+
entropy = 2.75
|
|
368
|
+
keywords = ["curl"]
|
|
369
|
+
|
|
370
|
+
[[rules]]
|
|
371
|
+
id = "curl-auth-user"
|
|
372
|
+
description = "Discovered a potential basic authorization token provided in a curl command, which could compromise the curl accessed resource."
|
|
373
|
+
regex = '''\bcurl\b(?:.*|.*(?:[\r\n]{1,2}.*){1,5})[ \t\n\r](?:-u|--user)(?:=|[ \t]{0,5})("(:[^"]{3,}|[^:"]{3,}:|[^:"]{3,}:[^"]{3,})"|'([^:']{3,}:[^']{3,})'|((?:"[^"]{3,}"|'[^']{3,}'|[\w$@.-]+):(?:"[^"]{3,}"|'[^']{3,}'|[\w${}@.-]+)))(?:\s|\z)'''
|
|
374
|
+
entropy = 2
|
|
375
|
+
keywords = ["curl"]
|
|
376
|
+
[[rules.allowlists]]
|
|
377
|
+
regexes = [
|
|
378
|
+
'''[^:]+:(?:change(?:it|me)|pass(?:word)?|pwd|test|token|\*+|x+)''',
|
|
379
|
+
'''['"]?<[^>]+>['"]?:['"]?<[^>]+>|<[^:]+:[^>]+>['"]?''',
|
|
380
|
+
'''[^:]+:\[[^]]+]''',
|
|
381
|
+
'''['"]?[^:]+['"]?:['"]?\$(?:\d|\w+|\{(?:\d|\w+)})['"]?''',
|
|
382
|
+
'''\$\([^)]+\):\$\([^)]+\)''',
|
|
383
|
+
'''['"]?\$?{{[^}]+}}['"]?:['"]?\$?{{[^}]+}}['"]?''',
|
|
384
|
+
]
|
|
385
|
+
|
|
386
|
+
[[rules]]
|
|
387
|
+
id = "databricks-api-token"
|
|
388
|
+
description = "Uncovered a Databricks API token, which may compromise big data analytics platforms and sensitive data processing."
|
|
389
|
+
regex = '''\b(dapi[a-f0-9]{32}(?:-\d)?)(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
390
|
+
entropy = 3
|
|
391
|
+
keywords = ["dapi"]
|
|
392
|
+
|
|
393
|
+
[[rules]]
|
|
394
|
+
id = "datadog-access-token"
|
|
395
|
+
description = "Detected a Datadog Access Token, potentially risking monitoring and analytics data exposure and manipulation."
|
|
396
|
+
regex = '''(?i)[\w.-]{0,50}?(?:datadog)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
397
|
+
keywords = ["datadog"]
|
|
398
|
+
|
|
399
|
+
[[rules]]
|
|
400
|
+
id = "defined-networking-api-token"
|
|
401
|
+
description = "Identified a Defined Networking API token, which could lead to unauthorized network operations and data breaches."
|
|
402
|
+
regex = '''(?i)[\w.-]{0,50}?(?:dnkey)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(dnkey-[a-z0-9=_\-]{26}-[a-z0-9=_\-]{52})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
403
|
+
keywords = ["dnkey"]
|
|
404
|
+
|
|
405
|
+
[[rules]]
|
|
406
|
+
id = "digitalocean-access-token"
|
|
407
|
+
description = "Found a DigitalOcean OAuth Access Token, risking unauthorized cloud resource access and data compromise."
|
|
408
|
+
regex = '''\b(doo_v1_[a-f0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
409
|
+
entropy = 3
|
|
410
|
+
keywords = ["doo_v1_"]
|
|
411
|
+
|
|
412
|
+
[[rules]]
|
|
413
|
+
id = "digitalocean-pat"
|
|
414
|
+
description = "Discovered a DigitalOcean Personal Access Token, posing a threat to cloud infrastructure security and data privacy."
|
|
415
|
+
regex = '''\b(dop_v1_[a-f0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
416
|
+
entropy = 3
|
|
417
|
+
keywords = ["dop_v1_"]
|
|
418
|
+
|
|
419
|
+
[[rules]]
|
|
420
|
+
id = "digitalocean-refresh-token"
|
|
421
|
+
description = "Uncovered a DigitalOcean OAuth Refresh Token, which could allow prolonged unauthorized access and resource manipulation."
|
|
422
|
+
regex = '''(?i)\b(dor_v1_[a-f0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
423
|
+
keywords = ["dor_v1_"]
|
|
424
|
+
|
|
425
|
+
[[rules]]
|
|
426
|
+
id = "discord-api-token"
|
|
427
|
+
description = "Detected a Discord API key, potentially compromising communication channels and user data privacy on Discord."
|
|
428
|
+
regex = '''(?i)[\w.-]{0,50}?(?:discord)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
429
|
+
keywords = ["discord"]
|
|
430
|
+
|
|
431
|
+
[[rules]]
|
|
432
|
+
id = "discord-client-id"
|
|
433
|
+
description = "Identified a Discord client ID, which may lead to unauthorized integrations and data exposure in Discord applications."
|
|
434
|
+
regex = '''(?i)[\w.-]{0,50}?(?:discord)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9]{18})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
435
|
+
entropy = 2
|
|
436
|
+
keywords = ["discord"]
|
|
437
|
+
|
|
438
|
+
[[rules]]
|
|
439
|
+
id = "discord-client-secret"
|
|
440
|
+
description = "Discovered a potential Discord client secret, risking compromised Discord bot integrations and data leaks."
|
|
441
|
+
regex = '''(?i)[\w.-]{0,50}?(?:discord)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9=_\-]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
442
|
+
entropy = 2
|
|
443
|
+
keywords = ["discord"]
|
|
444
|
+
|
|
445
|
+
[[rules]]
|
|
446
|
+
id = "doppler-api-token"
|
|
447
|
+
description = "Discovered a Doppler API token, posing a risk to environment and secrets management security."
|
|
448
|
+
regex = '''dp\.pt\.(?i)[a-z0-9]{43}'''
|
|
449
|
+
entropy = 2
|
|
450
|
+
keywords = ["dp.pt."]
|
|
451
|
+
|
|
452
|
+
[[rules]]
|
|
453
|
+
id = "droneci-access-token"
|
|
454
|
+
description = "Detected a Droneci Access Token, potentially compromising continuous integration and deployment workflows."
|
|
455
|
+
regex = '''(?i)[\w.-]{0,50}?(?:droneci)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
456
|
+
keywords = ["droneci"]
|
|
457
|
+
|
|
458
|
+
[[rules]]
|
|
459
|
+
id = "dropbox-api-token"
|
|
460
|
+
description = "Identified a Dropbox API secret, which could lead to unauthorized file access and data breaches in Dropbox storage."
|
|
461
|
+
regex = '''(?i)[\w.-]{0,50}?(?:dropbox)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{15})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
462
|
+
keywords = ["dropbox"]
|
|
463
|
+
|
|
464
|
+
[[rules]]
|
|
465
|
+
id = "dropbox-long-lived-api-token"
|
|
466
|
+
description = "Found a Dropbox long-lived API token, risking prolonged unauthorized access to cloud storage and sensitive data."
|
|
467
|
+
regex = '''(?i)[\w.-]{0,50}?(?:dropbox)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{11}(AAAAAAAAAA)[a-z0-9\-_=]{43})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
468
|
+
keywords = ["dropbox"]
|
|
469
|
+
|
|
470
|
+
[[rules]]
|
|
471
|
+
id = "dropbox-short-lived-api-token"
|
|
472
|
+
description = "Discovered a Dropbox short-lived API token, posing a risk of temporary but potentially harmful data access and manipulation."
|
|
473
|
+
regex = '''(?i)[\w.-]{0,50}?(?:dropbox)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(sl\.[a-z0-9\-=_]{135})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
474
|
+
keywords = ["dropbox"]
|
|
475
|
+
|
|
476
|
+
[[rules]]
|
|
477
|
+
id = "duffel-api-token"
|
|
478
|
+
description = "Uncovered a Duffel API token, which may compromise travel platform integrations and sensitive customer data."
|
|
479
|
+
regex = '''duffel_(?:test|live)_(?i)[a-z0-9_\-=]{43}'''
|
|
480
|
+
entropy = 2
|
|
481
|
+
keywords = ["duffel_"]
|
|
482
|
+
|
|
483
|
+
[[rules]]
|
|
484
|
+
id = "dynatrace-api-token"
|
|
485
|
+
description = "Detected a Dynatrace API token, potentially risking application performance monitoring and data exposure."
|
|
486
|
+
regex = '''dt0c01\.(?i)[a-z0-9]{24}\.[a-z0-9]{64}'''
|
|
487
|
+
entropy = 4
|
|
488
|
+
keywords = ["dt0c01."]
|
|
489
|
+
|
|
490
|
+
[[rules]]
|
|
491
|
+
id = "easypost-api-token"
|
|
492
|
+
description = "Identified an EasyPost API token, which could lead to unauthorized postal and shipment service access and data exposure."
|
|
493
|
+
regex = '''\bEZAK(?i)[a-z0-9]{54}\b'''
|
|
494
|
+
entropy = 2
|
|
495
|
+
keywords = ["ezak"]
|
|
496
|
+
|
|
497
|
+
[[rules]]
|
|
498
|
+
id = "easypost-test-api-token"
|
|
499
|
+
description = "Detected an EasyPost test API token, risking exposure of test environments and potentially sensitive shipment data."
|
|
500
|
+
regex = '''\bEZTK(?i)[a-z0-9]{54}\b'''
|
|
501
|
+
entropy = 2
|
|
502
|
+
keywords = ["eztk"]
|
|
503
|
+
|
|
504
|
+
[[rules]]
|
|
505
|
+
id = "etsy-access-token"
|
|
506
|
+
description = "Found an Etsy Access Token, potentially compromising Etsy shop management and customer data."
|
|
507
|
+
regex = '''(?i)[\w.-]{0,50}?(?:(?-i:ETSY|[Ee]tsy))(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{24})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
508
|
+
entropy = 3
|
|
509
|
+
keywords = ["etsy"]
|
|
510
|
+
|
|
511
|
+
[[rules]]
|
|
512
|
+
id = "facebook-access-token"
|
|
513
|
+
description = "Discovered a Facebook Access Token, posing a risk of unauthorized access to Facebook accounts and personal data exposure."
|
|
514
|
+
regex = '''(?i)\b(\d{15,16}(\||%)[0-9a-z\-_]{27,40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
515
|
+
entropy = 3
|
|
516
|
+
keywords = ["facebook"]
|
|
517
|
+
|
|
518
|
+
[[rules]]
|
|
519
|
+
id = "facebook-page-access-token"
|
|
520
|
+
description = "Discovered a Facebook Page Access Token, posing a risk of unauthorized access to Facebook accounts and personal data exposure."
|
|
521
|
+
regex = '''\b(EAA[MC](?i)[a-z0-9]{100,})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
522
|
+
entropy = 4
|
|
523
|
+
keywords = [
|
|
524
|
+
"eaam",
|
|
525
|
+
"eaac",
|
|
526
|
+
]
|
|
527
|
+
|
|
528
|
+
[[rules]]
|
|
529
|
+
id = "facebook-secret"
|
|
530
|
+
description = "Discovered a Facebook Application secret, posing a risk of unauthorized access to Facebook accounts and personal data exposure."
|
|
531
|
+
regex = '''(?i)[\w.-]{0,50}?(?:facebook)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
532
|
+
entropy = 3
|
|
533
|
+
keywords = ["facebook"]
|
|
534
|
+
|
|
535
|
+
[[rules]]
|
|
536
|
+
id = "fastly-api-token"
|
|
537
|
+
description = "Uncovered a Fastly API key, which may compromise CDN and edge cloud services, leading to content delivery and security issues."
|
|
538
|
+
regex = '''(?i)[\w.-]{0,50}?(?:fastly)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9=_\-]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
539
|
+
keywords = ["fastly"]
|
|
540
|
+
|
|
541
|
+
[[rules]]
|
|
542
|
+
id = "finicity-api-token"
|
|
543
|
+
description = "Detected a Finicity API token, potentially risking financial data access and unauthorized financial operations."
|
|
544
|
+
regex = '''(?i)[\w.-]{0,50}?(?:finicity)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
545
|
+
keywords = ["finicity"]
|
|
546
|
+
|
|
547
|
+
[[rules]]
|
|
548
|
+
id = "finicity-client-secret"
|
|
549
|
+
description = "Identified a Finicity Client Secret, which could lead to compromised financial service integrations and data breaches."
|
|
550
|
+
regex = '''(?i)[\w.-]{0,50}?(?:finicity)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{20})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
551
|
+
keywords = ["finicity"]
|
|
552
|
+
|
|
553
|
+
[[rules]]
|
|
554
|
+
id = "finnhub-access-token"
|
|
555
|
+
description = "Found a Finnhub Access Token, risking unauthorized access to financial market data and analytics."
|
|
556
|
+
regex = '''(?i)[\w.-]{0,50}?(?:finnhub)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{20})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
557
|
+
keywords = ["finnhub"]
|
|
558
|
+
|
|
559
|
+
[[rules]]
|
|
560
|
+
id = "flickr-access-token"
|
|
561
|
+
description = "Discovered a Flickr Access Token, posing a risk of unauthorized photo management and potential data leakage."
|
|
562
|
+
regex = '''(?i)[\w.-]{0,50}?(?:flickr)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
563
|
+
keywords = ["flickr"]
|
|
564
|
+
|
|
565
|
+
[[rules]]
|
|
566
|
+
id = "flutterwave-encryption-key"
|
|
567
|
+
description = "Uncovered a Flutterwave Encryption Key, which may compromise payment processing and sensitive financial information."
|
|
568
|
+
regex = '''FLWSECK_TEST-(?i)[a-h0-9]{12}'''
|
|
569
|
+
entropy = 2
|
|
570
|
+
keywords = ["flwseck_test"]
|
|
571
|
+
|
|
572
|
+
[[rules]]
|
|
573
|
+
id = "flutterwave-public-key"
|
|
574
|
+
description = "Detected a Finicity Public Key, potentially exposing public cryptographic operations and integrations."
|
|
575
|
+
regex = '''FLWPUBK_TEST-(?i)[a-h0-9]{32}-X'''
|
|
576
|
+
entropy = 2
|
|
577
|
+
keywords = ["flwpubk_test"]
|
|
578
|
+
|
|
579
|
+
[[rules]]
|
|
580
|
+
id = "flutterwave-secret-key"
|
|
581
|
+
description = "Identified a Flutterwave Secret Key, risking unauthorized financial transactions and data breaches."
|
|
582
|
+
regex = '''FLWSECK_TEST-(?i)[a-h0-9]{32}-X'''
|
|
583
|
+
entropy = 2
|
|
584
|
+
keywords = ["flwseck_test"]
|
|
585
|
+
|
|
586
|
+
[[rules]]
|
|
587
|
+
id = "flyio-access-token"
|
|
588
|
+
description = "Uncovered a Fly.io API key"
|
|
589
|
+
regex = '''\b((?:fo1_[\w-]{43}|fm1[ar]_[a-zA-Z0-9+\/]{100,}={0,3}|fm2_[a-zA-Z0-9+\/]{100,}={0,3}))(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
590
|
+
entropy = 4
|
|
591
|
+
keywords = [
|
|
592
|
+
"fo1_",
|
|
593
|
+
"fm1",
|
|
594
|
+
"fm2_",
|
|
595
|
+
]
|
|
596
|
+
|
|
597
|
+
[[rules]]
|
|
598
|
+
id = "frameio-api-token"
|
|
599
|
+
description = "Found a Frame.io API token, potentially compromising video collaboration and project management."
|
|
600
|
+
regex = '''fio-u-(?i)[a-z0-9\-_=]{64}'''
|
|
601
|
+
keywords = ["fio-u-"]
|
|
602
|
+
|
|
603
|
+
[[rules]]
|
|
604
|
+
id = "freemius-secret-key"
|
|
605
|
+
description = "Detected a Freemius secret key, potentially exposing sensitive information."
|
|
606
|
+
regex = '''(?i)["']secret_key["']\s*=>\s*["'](sk_[\S]{29})["']'''
|
|
607
|
+
path = '''(?i)\.php$'''
|
|
608
|
+
keywords = ["secret_key"]
|
|
609
|
+
|
|
610
|
+
[[rules]]
|
|
611
|
+
id = "freshbooks-access-token"
|
|
612
|
+
description = "Discovered a Freshbooks Access Token, posing a risk to accounting software access and sensitive financial data exposure."
|
|
613
|
+
regex = '''(?i)[\w.-]{0,50}?(?:freshbooks)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
614
|
+
keywords = ["freshbooks"]
|
|
615
|
+
|
|
616
|
+
[[rules]]
|
|
617
|
+
id = "gcp-api-key"
|
|
618
|
+
description = "Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches."
|
|
619
|
+
regex = '''\b(AIza[\w-]{35})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
620
|
+
entropy = 4
|
|
621
|
+
keywords = ["aiza"]
|
|
622
|
+
[[rules.allowlists]]
|
|
623
|
+
regexes = [
|
|
624
|
+
'''AIzaSyabcdefghijklmnopqrstuvwxyz1234567''',
|
|
625
|
+
'''AIzaSyAnLA7NfeLquW1tJFpx_eQCxoX-oo6YyIs''',
|
|
626
|
+
'''AIzaSyCkEhVjf3pduRDt6d1yKOMitrUEke8agEM''',
|
|
627
|
+
'''AIzaSyDMAScliyLx7F0NPDEJi1QmyCgHIAODrlU''',
|
|
628
|
+
'''AIzaSyD3asb-2pEZVqMkmL6M9N6nHZRR_znhrh0''',
|
|
629
|
+
'''AIzayDNSXIbFmlXbIE6mCzDLQAqITYefhixbX4A''',
|
|
630
|
+
'''AIzaSyAdOS2zB6NCsk1pCdZ4-P6GBdi_UUPwX7c''',
|
|
631
|
+
'''AIzaSyASWm6HmTMdYWpgMnjRBjxcQ9CKctWmLd4''',
|
|
632
|
+
'''AIzaSyANUvH9H9BsUccjsu2pCmEkOPjjaXeDQgY''',
|
|
633
|
+
'''AIzaSyA5_iVawFQ8ABuTZNUdcwERLJv_a_p4wtM''',
|
|
634
|
+
'''AIzaSyA4UrcGxgwQFTfaI3no3t7Lt1sjmdnP5sQ''',
|
|
635
|
+
'''AIzaSyDSb51JiIcB6OJpwwMicseKRhhrOq1cS7g''',
|
|
636
|
+
'''AIzaSyBF2RrAIm4a0mO64EShQfqfd2AFnzAvvuU''',
|
|
637
|
+
'''AIzaSyBcE-OOIbhjyR83gm4r2MFCu4MJmprNXsw''',
|
|
638
|
+
'''AIzaSyB8qGxt4ec15vitgn44duC5ucxaOi4FmqE''',
|
|
639
|
+
'''AIzaSyA8vmApnrHNFE0bApF4hoZ11srVL_n0nvY''',
|
|
640
|
+
]
|
|
641
|
+
|
|
642
|
+
[[rules]]
|
|
643
|
+
id = "generic-api-key"
|
|
644
|
+
description = "Detected a Generic API Key, potentially exposing access to various services and sensitive operations."
|
|
645
|
+
regex = '''(?i)[\w.-]{0,50}?(?:access|auth|(?-i:[Aa]pi|API)|credential|creds|key|passw(?:or)?d|secret|token)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([\w.=-]{10,150}|[a-z0-9][a-z0-9+/]{11,}={0,3})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
646
|
+
entropy = 3.5
|
|
647
|
+
keywords = [
|
|
648
|
+
"access",
|
|
649
|
+
"api",
|
|
650
|
+
"auth",
|
|
651
|
+
"key",
|
|
652
|
+
"credential",
|
|
653
|
+
"creds",
|
|
654
|
+
"passwd",
|
|
655
|
+
"password",
|
|
656
|
+
"secret",
|
|
657
|
+
"token",
|
|
658
|
+
]
|
|
659
|
+
[[rules.allowlists]]
|
|
660
|
+
regexes = [
|
|
661
|
+
'''^[a-zA-Z_.-]+$''',
|
|
662
|
+
]
|
|
663
|
+
[[rules.allowlists]]
|
|
664
|
+
description = "Allowlist for Generic API Keys"
|
|
665
|
+
regexTarget = "match"
|
|
666
|
+
regexes = [
|
|
667
|
+
'''(?i)(?:access(?:ibility|or)|access[_.-]?id|random[_.-]?access|api[_.-]?(?:id|name|version)|rapid|capital|[a-z0-9-]*?api[a-z0-9-]*?:jar:|author|X-MS-Exchange-Organization-Auth|Authentication-Results|(?:credentials?[_.-]?id|withCredentials)|(?:bucket|foreign|hot|idx|natural|primary|pub(?:lic)?|schema|sequence)[_.-]?key|(?:turkey)|key[_.-]?(?:alias|board|code|frame|id|length|mesh|name|pair|press(?:ed)?|ring|selector|signature|size|stone|storetype|word|up|down|left|right)|key[_.-]?vault[_.-]?(?:id|name)|keyVaultToStoreSecrets|key(?:store|tab)[_.-]?(?:file|path)|issuerkeyhash|(?-i:[DdMm]onkey|[DM]ONKEY)|keying|(?:secret)[_.-]?(?:length|name|size)|UserSecretsId|(?:csrf)[_.-]?token|(?:io\.jsonwebtoken[ \t]?:[ \t]?[\w-]+)|(?:api|credentials|token)[_.-]?(?:endpoint|ur[il])|public[_.-]?token|(?:key|token)[_.-]?file|(?-i:(?:[A-Z_]+=\n[A-Z_]+=|[a-z_]+=\n[a-z_]+=)(?:\n|\z))|(?-i:(?:[A-Z.]+=\n[A-Z.]+=|[a-z.]+=\n[a-z.]+=)(?:\n|\z)))''',
|
|
668
|
+
]
|
|
669
|
+
stopwords = [
|
|
670
|
+
"000000",
|
|
671
|
+
"6fe4476ee5a1832882e326b506d14126",
|
|
672
|
+
"_ec2_",
|
|
673
|
+
"aaaaaa",
|
|
674
|
+
"about",
|
|
675
|
+
"abstract",
|
|
676
|
+
"academy",
|
|
677
|
+
"acces",
|
|
678
|
+
"account",
|
|
679
|
+
"act-",
|
|
680
|
+
"act.",
|
|
681
|
+
"act_",
|
|
682
|
+
"action",
|
|
683
|
+
"active",
|
|
684
|
+
"actively",
|
|
685
|
+
"activity",
|
|
686
|
+
"adapter",
|
|
687
|
+
"add-",
|
|
688
|
+
"add-on",
|
|
689
|
+
"add.",
|
|
690
|
+
"add_",
|
|
691
|
+
"addon",
|
|
692
|
+
"addres",
|
|
693
|
+
"admin",
|
|
694
|
+
"adobe",
|
|
695
|
+
"advanced",
|
|
696
|
+
"adventure",
|
|
697
|
+
"agent",
|
|
698
|
+
"agile",
|
|
699
|
+
"air-",
|
|
700
|
+
"air.",
|
|
701
|
+
"air_",
|
|
702
|
+
"ajax",
|
|
703
|
+
"akka",
|
|
704
|
+
"alert",
|
|
705
|
+
"alfred",
|
|
706
|
+
"algorithm",
|
|
707
|
+
"all-",
|
|
708
|
+
"all.",
|
|
709
|
+
"all_",
|
|
710
|
+
"alloy",
|
|
711
|
+
"alpha",
|
|
712
|
+
"amazon",
|
|
713
|
+
"amqp",
|
|
714
|
+
"analysi",
|
|
715
|
+
"analytic",
|
|
716
|
+
"analyzer",
|
|
717
|
+
"android",
|
|
718
|
+
"angular",
|
|
719
|
+
"angularj",
|
|
720
|
+
"animate",
|
|
721
|
+
"animation",
|
|
722
|
+
"another",
|
|
723
|
+
"ansible",
|
|
724
|
+
"answer",
|
|
725
|
+
"ant-",
|
|
726
|
+
"ant.",
|
|
727
|
+
"ant_",
|
|
728
|
+
"any-",
|
|
729
|
+
"any.",
|
|
730
|
+
"any_",
|
|
731
|
+
"apache",
|
|
732
|
+
"app-",
|
|
733
|
+
"app.",
|
|
734
|
+
"app_",
|
|
735
|
+
"apple",
|
|
736
|
+
"arch",
|
|
737
|
+
"archive",
|
|
738
|
+
"archived",
|
|
739
|
+
"arduino",
|
|
740
|
+
"array",
|
|
741
|
+
"art-",
|
|
742
|
+
"art.",
|
|
743
|
+
"art_",
|
|
744
|
+
"article",
|
|
745
|
+
"asp-",
|
|
746
|
+
"asp.",
|
|
747
|
+
"asp_",
|
|
748
|
+
"asset",
|
|
749
|
+
"async",
|
|
750
|
+
"atom",
|
|
751
|
+
"attention",
|
|
752
|
+
"audio",
|
|
753
|
+
"audit",
|
|
754
|
+
"aura",
|
|
755
|
+
"auth",
|
|
756
|
+
"author",
|
|
757
|
+
"authorize",
|
|
758
|
+
"auto",
|
|
759
|
+
"automated",
|
|
760
|
+
"automatic",
|
|
761
|
+
"awesome",
|
|
762
|
+
"aws_",
|
|
763
|
+
"azure",
|
|
764
|
+
"back",
|
|
765
|
+
"backbone",
|
|
766
|
+
"backend",
|
|
767
|
+
"backup",
|
|
768
|
+
"bar-",
|
|
769
|
+
"bar.",
|
|
770
|
+
"bar_",
|
|
771
|
+
"base",
|
|
772
|
+
"based",
|
|
773
|
+
"bash",
|
|
774
|
+
"basic",
|
|
775
|
+
"batch",
|
|
776
|
+
"been",
|
|
777
|
+
"beer",
|
|
778
|
+
"behavior",
|
|
779
|
+
"being",
|
|
780
|
+
"benchmark",
|
|
781
|
+
"best",
|
|
782
|
+
"beta",
|
|
783
|
+
"better",
|
|
784
|
+
"big-",
|
|
785
|
+
"big.",
|
|
786
|
+
"big_",
|
|
787
|
+
"binary",
|
|
788
|
+
"binding",
|
|
789
|
+
"bit-",
|
|
790
|
+
"bit.",
|
|
791
|
+
"bit_",
|
|
792
|
+
"bitcoin",
|
|
793
|
+
"block",
|
|
794
|
+
"blog",
|
|
795
|
+
"board",
|
|
796
|
+
"book",
|
|
797
|
+
"bookmark",
|
|
798
|
+
"boost",
|
|
799
|
+
"boot",
|
|
800
|
+
"bootstrap",
|
|
801
|
+
"bosh",
|
|
802
|
+
"bot-",
|
|
803
|
+
"bot.",
|
|
804
|
+
"bot_",
|
|
805
|
+
"bower",
|
|
806
|
+
"box-",
|
|
807
|
+
"box.",
|
|
808
|
+
"box_",
|
|
809
|
+
"boxen",
|
|
810
|
+
"bracket",
|
|
811
|
+
"branch",
|
|
812
|
+
"bridge",
|
|
813
|
+
"browser",
|
|
814
|
+
"brunch",
|
|
815
|
+
"buffer",
|
|
816
|
+
"bug-",
|
|
817
|
+
"bug.",
|
|
818
|
+
"bug_",
|
|
819
|
+
"build",
|
|
820
|
+
"builder",
|
|
821
|
+
"building",
|
|
822
|
+
"buildout",
|
|
823
|
+
"buildpack",
|
|
824
|
+
"built",
|
|
825
|
+
"bundle",
|
|
826
|
+
"busines",
|
|
827
|
+
"but-",
|
|
828
|
+
"but.",
|
|
829
|
+
"but_",
|
|
830
|
+
"button",
|
|
831
|
+
"cache",
|
|
832
|
+
"caching",
|
|
833
|
+
"cakephp",
|
|
834
|
+
"calendar",
|
|
835
|
+
"call",
|
|
836
|
+
"camera",
|
|
837
|
+
"campfire",
|
|
838
|
+
"can-",
|
|
839
|
+
"can.",
|
|
840
|
+
"can_",
|
|
841
|
+
"canva",
|
|
842
|
+
"captcha",
|
|
843
|
+
"capture",
|
|
844
|
+
"card",
|
|
845
|
+
"carousel",
|
|
846
|
+
"case",
|
|
847
|
+
"cassandra",
|
|
848
|
+
"cat-",
|
|
849
|
+
"cat.",
|
|
850
|
+
"cat_",
|
|
851
|
+
"category",
|
|
852
|
+
"center",
|
|
853
|
+
"cento",
|
|
854
|
+
"challenge",
|
|
855
|
+
"change",
|
|
856
|
+
"changelog",
|
|
857
|
+
"channel",
|
|
858
|
+
"chart",
|
|
859
|
+
"chat",
|
|
860
|
+
"cheat",
|
|
861
|
+
"check",
|
|
862
|
+
"checker",
|
|
863
|
+
"chef",
|
|
864
|
+
"ches",
|
|
865
|
+
"chinese",
|
|
866
|
+
"chosen",
|
|
867
|
+
"chrome",
|
|
868
|
+
"ckeditor",
|
|
869
|
+
"clas",
|
|
870
|
+
"classe",
|
|
871
|
+
"classic",
|
|
872
|
+
"clean",
|
|
873
|
+
"cli-",
|
|
874
|
+
"cli.",
|
|
875
|
+
"cli_",
|
|
876
|
+
"client",
|
|
877
|
+
"clojure",
|
|
878
|
+
"clone",
|
|
879
|
+
"closure",
|
|
880
|
+
"cloud",
|
|
881
|
+
"club",
|
|
882
|
+
"cluster",
|
|
883
|
+
"cms-",
|
|
884
|
+
"cms_",
|
|
885
|
+
"coco",
|
|
886
|
+
"code",
|
|
887
|
+
"coding",
|
|
888
|
+
"coffee",
|
|
889
|
+
"color",
|
|
890
|
+
"combination",
|
|
891
|
+
"combo",
|
|
892
|
+
"command",
|
|
893
|
+
"commander",
|
|
894
|
+
"comment",
|
|
895
|
+
"commit",
|
|
896
|
+
"common",
|
|
897
|
+
"community",
|
|
898
|
+
"compas",
|
|
899
|
+
"compiler",
|
|
900
|
+
"complete",
|
|
901
|
+
"component",
|
|
902
|
+
"composer",
|
|
903
|
+
"computer",
|
|
904
|
+
"computing",
|
|
905
|
+
"con-",
|
|
906
|
+
"con.",
|
|
907
|
+
"con_",
|
|
908
|
+
"concept",
|
|
909
|
+
"conf",
|
|
910
|
+
"config",
|
|
911
|
+
"connect",
|
|
912
|
+
"connector",
|
|
913
|
+
"console",
|
|
914
|
+
"contact",
|
|
915
|
+
"container",
|
|
916
|
+
"contao",
|
|
917
|
+
"content",
|
|
918
|
+
"contest",
|
|
919
|
+
"context",
|
|
920
|
+
"control",
|
|
921
|
+
"convert",
|
|
922
|
+
"converter",
|
|
923
|
+
"conway'",
|
|
924
|
+
"cookbook",
|
|
925
|
+
"cookie",
|
|
926
|
+
"cool",
|
|
927
|
+
"copy",
|
|
928
|
+
"cordova",
|
|
929
|
+
"core",
|
|
930
|
+
"couchbase",
|
|
931
|
+
"couchdb",
|
|
932
|
+
"countdown",
|
|
933
|
+
"counter",
|
|
934
|
+
"course",
|
|
935
|
+
"craft",
|
|
936
|
+
"crawler",
|
|
937
|
+
"create",
|
|
938
|
+
"creating",
|
|
939
|
+
"creator",
|
|
940
|
+
"credential",
|
|
941
|
+
"crm-",
|
|
942
|
+
"crm.",
|
|
943
|
+
"crm_",
|
|
944
|
+
"cros",
|
|
945
|
+
"crud",
|
|
946
|
+
"csv-",
|
|
947
|
+
"csv.",
|
|
948
|
+
"csv_",
|
|
949
|
+
"cube",
|
|
950
|
+
"cucumber",
|
|
951
|
+
"cuda",
|
|
952
|
+
"current",
|
|
953
|
+
"currently",
|
|
954
|
+
"custom",
|
|
955
|
+
"daemon",
|
|
956
|
+
"dark",
|
|
957
|
+
"dart",
|
|
958
|
+
"dash",
|
|
959
|
+
"dashboard",
|
|
960
|
+
"data",
|
|
961
|
+
"database",
|
|
962
|
+
"date",
|
|
963
|
+
"day-",
|
|
964
|
+
"day.",
|
|
965
|
+
"day_",
|
|
966
|
+
"dead",
|
|
967
|
+
"debian",
|
|
968
|
+
"debug",
|
|
969
|
+
"debugger",
|
|
970
|
+
"deck",
|
|
971
|
+
"define",
|
|
972
|
+
"del-",
|
|
973
|
+
"del.",
|
|
974
|
+
"del_",
|
|
975
|
+
"delete",
|
|
976
|
+
"demo",
|
|
977
|
+
"deploy",
|
|
978
|
+
"design",
|
|
979
|
+
"designer",
|
|
980
|
+
"desktop",
|
|
981
|
+
"detection",
|
|
982
|
+
"detector",
|
|
983
|
+
"dev-",
|
|
984
|
+
"dev.",
|
|
985
|
+
"dev_",
|
|
986
|
+
"develop",
|
|
987
|
+
"developer",
|
|
988
|
+
"device",
|
|
989
|
+
"devise",
|
|
990
|
+
"diff",
|
|
991
|
+
"digital",
|
|
992
|
+
"directive",
|
|
993
|
+
"directory",
|
|
994
|
+
"discovery",
|
|
995
|
+
"display",
|
|
996
|
+
"django",
|
|
997
|
+
"dns-",
|
|
998
|
+
"dns_",
|
|
999
|
+
"doc-",
|
|
1000
|
+
"doc.",
|
|
1001
|
+
"doc_",
|
|
1002
|
+
"docker",
|
|
1003
|
+
"docpad",
|
|
1004
|
+
"doctrine",
|
|
1005
|
+
"document",
|
|
1006
|
+
"doe-",
|
|
1007
|
+
"doe.",
|
|
1008
|
+
"doe_",
|
|
1009
|
+
"dojo",
|
|
1010
|
+
"dom-",
|
|
1011
|
+
"dom.",
|
|
1012
|
+
"dom_",
|
|
1013
|
+
"domain",
|
|
1014
|
+
"don't",
|
|
1015
|
+
"done",
|
|
1016
|
+
"dot-",
|
|
1017
|
+
"dot.",
|
|
1018
|
+
"dot_",
|
|
1019
|
+
"dotfile",
|
|
1020
|
+
"download",
|
|
1021
|
+
"draft",
|
|
1022
|
+
"drag",
|
|
1023
|
+
"drill",
|
|
1024
|
+
"drive",
|
|
1025
|
+
"driven",
|
|
1026
|
+
"driver",
|
|
1027
|
+
"drop",
|
|
1028
|
+
"dropbox",
|
|
1029
|
+
"drupal",
|
|
1030
|
+
"dsl-",
|
|
1031
|
+
"dsl.",
|
|
1032
|
+
"dsl_",
|
|
1033
|
+
"dynamic",
|
|
1034
|
+
"easy",
|
|
1035
|
+
"ecdsa",
|
|
1036
|
+
"eclipse",
|
|
1037
|
+
"edit",
|
|
1038
|
+
"editing",
|
|
1039
|
+
"edition",
|
|
1040
|
+
"editor",
|
|
1041
|
+
"element",
|
|
1042
|
+
"emac",
|
|
1043
|
+
"email",
|
|
1044
|
+
"embed",
|
|
1045
|
+
"embedded",
|
|
1046
|
+
"ember",
|
|
1047
|
+
"emitter",
|
|
1048
|
+
"emulator",
|
|
1049
|
+
"encoding",
|
|
1050
|
+
"endpoint",
|
|
1051
|
+
"engine",
|
|
1052
|
+
"english",
|
|
1053
|
+
"enhanced",
|
|
1054
|
+
"entity",
|
|
1055
|
+
"entry",
|
|
1056
|
+
"env_",
|
|
1057
|
+
"episode",
|
|
1058
|
+
"erlang",
|
|
1059
|
+
"error",
|
|
1060
|
+
"espresso",
|
|
1061
|
+
"event",
|
|
1062
|
+
"evented",
|
|
1063
|
+
"example",
|
|
1064
|
+
"exchange",
|
|
1065
|
+
"exercise",
|
|
1066
|
+
"experiment",
|
|
1067
|
+
"expire",
|
|
1068
|
+
"exploit",
|
|
1069
|
+
"explorer",
|
|
1070
|
+
"export",
|
|
1071
|
+
"exporter",
|
|
1072
|
+
"expres",
|
|
1073
|
+
"ext-",
|
|
1074
|
+
"ext.",
|
|
1075
|
+
"ext_",
|
|
1076
|
+
"extended",
|
|
1077
|
+
"extension",
|
|
1078
|
+
"external",
|
|
1079
|
+
"extra",
|
|
1080
|
+
"extractor",
|
|
1081
|
+
"fabric",
|
|
1082
|
+
"facebook",
|
|
1083
|
+
"factory",
|
|
1084
|
+
"fake",
|
|
1085
|
+
"fast",
|
|
1086
|
+
"feature",
|
|
1087
|
+
"feed",
|
|
1088
|
+
"fewfwef",
|
|
1089
|
+
"ffmpeg",
|
|
1090
|
+
"field",
|
|
1091
|
+
"file",
|
|
1092
|
+
"filter",
|
|
1093
|
+
"find",
|
|
1094
|
+
"finder",
|
|
1095
|
+
"firefox",
|
|
1096
|
+
"firmware",
|
|
1097
|
+
"first",
|
|
1098
|
+
"fish",
|
|
1099
|
+
"fix-",
|
|
1100
|
+
"fix_",
|
|
1101
|
+
"flash",
|
|
1102
|
+
"flask",
|
|
1103
|
+
"flat",
|
|
1104
|
+
"flex",
|
|
1105
|
+
"flexible",
|
|
1106
|
+
"flickr",
|
|
1107
|
+
"flow",
|
|
1108
|
+
"fluent",
|
|
1109
|
+
"fluentd",
|
|
1110
|
+
"fluid",
|
|
1111
|
+
"folder",
|
|
1112
|
+
"font",
|
|
1113
|
+
"force",
|
|
1114
|
+
"foreman",
|
|
1115
|
+
"fork",
|
|
1116
|
+
"form",
|
|
1117
|
+
"format",
|
|
1118
|
+
"formatter",
|
|
1119
|
+
"forum",
|
|
1120
|
+
"foundry",
|
|
1121
|
+
"framework",
|
|
1122
|
+
"free",
|
|
1123
|
+
"friend",
|
|
1124
|
+
"friendly",
|
|
1125
|
+
"front-end",
|
|
1126
|
+
"frontend",
|
|
1127
|
+
"ftp-",
|
|
1128
|
+
"ftp.",
|
|
1129
|
+
"ftp_",
|
|
1130
|
+
"fuel",
|
|
1131
|
+
"full",
|
|
1132
|
+
"fun-",
|
|
1133
|
+
"fun.",
|
|
1134
|
+
"fun_",
|
|
1135
|
+
"func",
|
|
1136
|
+
"future",
|
|
1137
|
+
"gaia",
|
|
1138
|
+
"gallery",
|
|
1139
|
+
"game",
|
|
1140
|
+
"gateway",
|
|
1141
|
+
"gem-",
|
|
1142
|
+
"gem.",
|
|
1143
|
+
"gem_",
|
|
1144
|
+
"gen-",
|
|
1145
|
+
"gen.",
|
|
1146
|
+
"gen_",
|
|
1147
|
+
"general",
|
|
1148
|
+
"generator",
|
|
1149
|
+
"generic",
|
|
1150
|
+
"genetic",
|
|
1151
|
+
"get-",
|
|
1152
|
+
"get.",
|
|
1153
|
+
"get_",
|
|
1154
|
+
"getenv",
|
|
1155
|
+
"getting",
|
|
1156
|
+
"ghost",
|
|
1157
|
+
"gist",
|
|
1158
|
+
"git-",
|
|
1159
|
+
"git.",
|
|
1160
|
+
"git_",
|
|
1161
|
+
"github",
|
|
1162
|
+
"gitignore",
|
|
1163
|
+
"gitlab",
|
|
1164
|
+
"glas",
|
|
1165
|
+
"gmail",
|
|
1166
|
+
"gnome",
|
|
1167
|
+
"gnu-",
|
|
1168
|
+
"gnu.",
|
|
1169
|
+
"gnu_",
|
|
1170
|
+
"goal",
|
|
1171
|
+
"golang",
|
|
1172
|
+
"gollum",
|
|
1173
|
+
"good",
|
|
1174
|
+
"google",
|
|
1175
|
+
"gpu-",
|
|
1176
|
+
"gpu.",
|
|
1177
|
+
"gpu_",
|
|
1178
|
+
"gradle",
|
|
1179
|
+
"grail",
|
|
1180
|
+
"graph",
|
|
1181
|
+
"graphic",
|
|
1182
|
+
"great",
|
|
1183
|
+
"grid",
|
|
1184
|
+
"groovy",
|
|
1185
|
+
"group",
|
|
1186
|
+
"grunt",
|
|
1187
|
+
"guard",
|
|
1188
|
+
"gui-",
|
|
1189
|
+
"gui.",
|
|
1190
|
+
"gui_",
|
|
1191
|
+
"guide",
|
|
1192
|
+
"guideline",
|
|
1193
|
+
"gulp",
|
|
1194
|
+
"gwt-",
|
|
1195
|
+
"gwt.",
|
|
1196
|
+
"gwt_",
|
|
1197
|
+
"hack",
|
|
1198
|
+
"hackathon",
|
|
1199
|
+
"hacker",
|
|
1200
|
+
"hacking",
|
|
1201
|
+
"hadoop",
|
|
1202
|
+
"haml",
|
|
1203
|
+
"handler",
|
|
1204
|
+
"hardware",
|
|
1205
|
+
"has-",
|
|
1206
|
+
"has_",
|
|
1207
|
+
"hash",
|
|
1208
|
+
"haskell",
|
|
1209
|
+
"have",
|
|
1210
|
+
"haxe",
|
|
1211
|
+
"hello",
|
|
1212
|
+
"help",
|
|
1213
|
+
"helper",
|
|
1214
|
+
"here",
|
|
1215
|
+
"hero",
|
|
1216
|
+
"heroku",
|
|
1217
|
+
"high",
|
|
1218
|
+
"hipchat",
|
|
1219
|
+
"history",
|
|
1220
|
+
"home",
|
|
1221
|
+
"homebrew",
|
|
1222
|
+
"homepage",
|
|
1223
|
+
"hook",
|
|
1224
|
+
"host",
|
|
1225
|
+
"hosting",
|
|
1226
|
+
"hot-",
|
|
1227
|
+
"hot.",
|
|
1228
|
+
"hot_",
|
|
1229
|
+
"house",
|
|
1230
|
+
"how-",
|
|
1231
|
+
"how.",
|
|
1232
|
+
"how_",
|
|
1233
|
+
"html",
|
|
1234
|
+
"http",
|
|
1235
|
+
"hub-",
|
|
1236
|
+
"hub.",
|
|
1237
|
+
"hub_",
|
|
1238
|
+
"hubot",
|
|
1239
|
+
"human",
|
|
1240
|
+
"icon",
|
|
1241
|
+
"ide-",
|
|
1242
|
+
"ide.",
|
|
1243
|
+
"ide_",
|
|
1244
|
+
"idea",
|
|
1245
|
+
"identity",
|
|
1246
|
+
"idiomatic",
|
|
1247
|
+
"image",
|
|
1248
|
+
"impact",
|
|
1249
|
+
"import",
|
|
1250
|
+
"important",
|
|
1251
|
+
"importer",
|
|
1252
|
+
"impres",
|
|
1253
|
+
"index",
|
|
1254
|
+
"infinite",
|
|
1255
|
+
"info",
|
|
1256
|
+
"injection",
|
|
1257
|
+
"inline",
|
|
1258
|
+
"input",
|
|
1259
|
+
"inside",
|
|
1260
|
+
"inspector",
|
|
1261
|
+
"instagram",
|
|
1262
|
+
"install",
|
|
1263
|
+
"installer",
|
|
1264
|
+
"instant",
|
|
1265
|
+
"intellij",
|
|
1266
|
+
"interface",
|
|
1267
|
+
"internet",
|
|
1268
|
+
"interview",
|
|
1269
|
+
"into",
|
|
1270
|
+
"intro",
|
|
1271
|
+
"ionic",
|
|
1272
|
+
"iphone",
|
|
1273
|
+
"ipython",
|
|
1274
|
+
"irc-",
|
|
1275
|
+
"irc_",
|
|
1276
|
+
"iso-",
|
|
1277
|
+
"iso.",
|
|
1278
|
+
"iso_",
|
|
1279
|
+
"issue",
|
|
1280
|
+
"jade",
|
|
1281
|
+
"jasmine",
|
|
1282
|
+
"java",
|
|
1283
|
+
"jbos",
|
|
1284
|
+
"jekyll",
|
|
1285
|
+
"jenkin",
|
|
1286
|
+
"jetbrains",
|
|
1287
|
+
"job-",
|
|
1288
|
+
"job.",
|
|
1289
|
+
"job_",
|
|
1290
|
+
"joomla",
|
|
1291
|
+
"jpa-",
|
|
1292
|
+
"jpa.",
|
|
1293
|
+
"jpa_",
|
|
1294
|
+
"jquery",
|
|
1295
|
+
"json",
|
|
1296
|
+
"just",
|
|
1297
|
+
"kafka",
|
|
1298
|
+
"karma",
|
|
1299
|
+
"kata",
|
|
1300
|
+
"kernel",
|
|
1301
|
+
"keyboard",
|
|
1302
|
+
"kindle",
|
|
1303
|
+
"kit-",
|
|
1304
|
+
"kit.",
|
|
1305
|
+
"kit_",
|
|
1306
|
+
"kitchen",
|
|
1307
|
+
"knife",
|
|
1308
|
+
"koan",
|
|
1309
|
+
"kohana",
|
|
1310
|
+
"lab-",
|
|
1311
|
+
"lab.",
|
|
1312
|
+
"lab_",
|
|
1313
|
+
"lambda",
|
|
1314
|
+
"lamp",
|
|
1315
|
+
"language",
|
|
1316
|
+
"laravel",
|
|
1317
|
+
"last",
|
|
1318
|
+
"latest",
|
|
1319
|
+
"latex",
|
|
1320
|
+
"launcher",
|
|
1321
|
+
"layer",
|
|
1322
|
+
"layout",
|
|
1323
|
+
"lazy",
|
|
1324
|
+
"ldap",
|
|
1325
|
+
"leaflet",
|
|
1326
|
+
"league",
|
|
1327
|
+
"learn",
|
|
1328
|
+
"learning",
|
|
1329
|
+
"led-",
|
|
1330
|
+
"led.",
|
|
1331
|
+
"led_",
|
|
1332
|
+
"leetcode",
|
|
1333
|
+
"les-",
|
|
1334
|
+
"les.",
|
|
1335
|
+
"les_",
|
|
1336
|
+
"level",
|
|
1337
|
+
"leveldb",
|
|
1338
|
+
"lib-",
|
|
1339
|
+
"lib.",
|
|
1340
|
+
"lib_",
|
|
1341
|
+
"librarie",
|
|
1342
|
+
"library",
|
|
1343
|
+
"license",
|
|
1344
|
+
"life",
|
|
1345
|
+
"liferay",
|
|
1346
|
+
"light",
|
|
1347
|
+
"lightbox",
|
|
1348
|
+
"like",
|
|
1349
|
+
"line",
|
|
1350
|
+
"link",
|
|
1351
|
+
"linked",
|
|
1352
|
+
"linkedin",
|
|
1353
|
+
"linux",
|
|
1354
|
+
"lisp",
|
|
1355
|
+
"list",
|
|
1356
|
+
"lite",
|
|
1357
|
+
"little",
|
|
1358
|
+
"load",
|
|
1359
|
+
"loader",
|
|
1360
|
+
"local",
|
|
1361
|
+
"location",
|
|
1362
|
+
"lock",
|
|
1363
|
+
"log-",
|
|
1364
|
+
"log.",
|
|
1365
|
+
"log_",
|
|
1366
|
+
"logger",
|
|
1367
|
+
"logging",
|
|
1368
|
+
"logic",
|
|
1369
|
+
"login",
|
|
1370
|
+
"logstash",
|
|
1371
|
+
"longer",
|
|
1372
|
+
"look",
|
|
1373
|
+
"love",
|
|
1374
|
+
"lua-",
|
|
1375
|
+
"lua.",
|
|
1376
|
+
"lua_",
|
|
1377
|
+
"mac-",
|
|
1378
|
+
"mac.",
|
|
1379
|
+
"mac_",
|
|
1380
|
+
"machine",
|
|
1381
|
+
"made",
|
|
1382
|
+
"magento",
|
|
1383
|
+
"magic",
|
|
1384
|
+
"mail",
|
|
1385
|
+
"make",
|
|
1386
|
+
"maker",
|
|
1387
|
+
"making",
|
|
1388
|
+
"man-",
|
|
1389
|
+
"man.",
|
|
1390
|
+
"man_",
|
|
1391
|
+
"manage",
|
|
1392
|
+
"manager",
|
|
1393
|
+
"manifest",
|
|
1394
|
+
"manual",
|
|
1395
|
+
"map-",
|
|
1396
|
+
"map.",
|
|
1397
|
+
"map_",
|
|
1398
|
+
"mapper",
|
|
1399
|
+
"mapping",
|
|
1400
|
+
"markdown",
|
|
1401
|
+
"markup",
|
|
1402
|
+
"master",
|
|
1403
|
+
"math",
|
|
1404
|
+
"matrix",
|
|
1405
|
+
"maven",
|
|
1406
|
+
"md5",
|
|
1407
|
+
"mean",
|
|
1408
|
+
"media",
|
|
1409
|
+
"mediawiki",
|
|
1410
|
+
"meetup",
|
|
1411
|
+
"memcached",
|
|
1412
|
+
"memory",
|
|
1413
|
+
"menu",
|
|
1414
|
+
"merchant",
|
|
1415
|
+
"message",
|
|
1416
|
+
"messaging",
|
|
1417
|
+
"meta",
|
|
1418
|
+
"metadata",
|
|
1419
|
+
"meteor",
|
|
1420
|
+
"method",
|
|
1421
|
+
"metric",
|
|
1422
|
+
"micro",
|
|
1423
|
+
"middleman",
|
|
1424
|
+
"migration",
|
|
1425
|
+
"minecraft",
|
|
1426
|
+
"miner",
|
|
1427
|
+
"mini",
|
|
1428
|
+
"minimal",
|
|
1429
|
+
"mirror",
|
|
1430
|
+
"mit-",
|
|
1431
|
+
"mit.",
|
|
1432
|
+
"mit_",
|
|
1433
|
+
"mobile",
|
|
1434
|
+
"mocha",
|
|
1435
|
+
"mock",
|
|
1436
|
+
"mod-",
|
|
1437
|
+
"mod.",
|
|
1438
|
+
"mod_",
|
|
1439
|
+
"mode",
|
|
1440
|
+
"model",
|
|
1441
|
+
"modern",
|
|
1442
|
+
"modular",
|
|
1443
|
+
"module",
|
|
1444
|
+
"modx",
|
|
1445
|
+
"money",
|
|
1446
|
+
"mongo",
|
|
1447
|
+
"mongodb",
|
|
1448
|
+
"mongoid",
|
|
1449
|
+
"mongoose",
|
|
1450
|
+
"monitor",
|
|
1451
|
+
"monkey",
|
|
1452
|
+
"more",
|
|
1453
|
+
"motion",
|
|
1454
|
+
"moved",
|
|
1455
|
+
"movie",
|
|
1456
|
+
"mozilla",
|
|
1457
|
+
"mqtt",
|
|
1458
|
+
"mule",
|
|
1459
|
+
"multi",
|
|
1460
|
+
"multiple",
|
|
1461
|
+
"music",
|
|
1462
|
+
"mustache",
|
|
1463
|
+
"mvc-",
|
|
1464
|
+
"mvc.",
|
|
1465
|
+
"mvc_",
|
|
1466
|
+
"mysql",
|
|
1467
|
+
"nagio",
|
|
1468
|
+
"name",
|
|
1469
|
+
"native",
|
|
1470
|
+
"need",
|
|
1471
|
+
"neo-",
|
|
1472
|
+
"neo.",
|
|
1473
|
+
"neo_",
|
|
1474
|
+
"nest",
|
|
1475
|
+
"nested",
|
|
1476
|
+
"net-",
|
|
1477
|
+
"net.",
|
|
1478
|
+
"net_",
|
|
1479
|
+
"nette",
|
|
1480
|
+
"network",
|
|
1481
|
+
"new-",
|
|
1482
|
+
"new.",
|
|
1483
|
+
"new_",
|
|
1484
|
+
"next",
|
|
1485
|
+
"nginx",
|
|
1486
|
+
"ninja",
|
|
1487
|
+
"nlp-",
|
|
1488
|
+
"nlp.",
|
|
1489
|
+
"nlp_",
|
|
1490
|
+
"node",
|
|
1491
|
+
"nodej",
|
|
1492
|
+
"nosql",
|
|
1493
|
+
"not-",
|
|
1494
|
+
"not.",
|
|
1495
|
+
"not_",
|
|
1496
|
+
"note",
|
|
1497
|
+
"notebook",
|
|
1498
|
+
"notepad",
|
|
1499
|
+
"notice",
|
|
1500
|
+
"notifier",
|
|
1501
|
+
"now-",
|
|
1502
|
+
"now.",
|
|
1503
|
+
"now_",
|
|
1504
|
+
"number",
|
|
1505
|
+
"oauth",
|
|
1506
|
+
"object",
|
|
1507
|
+
"objective",
|
|
1508
|
+
"obsolete",
|
|
1509
|
+
"ocaml",
|
|
1510
|
+
"octopres",
|
|
1511
|
+
"official",
|
|
1512
|
+
"old-",
|
|
1513
|
+
"old.",
|
|
1514
|
+
"old_",
|
|
1515
|
+
"onboard",
|
|
1516
|
+
"online",
|
|
1517
|
+
"only",
|
|
1518
|
+
"open",
|
|
1519
|
+
"opencv",
|
|
1520
|
+
"opengl",
|
|
1521
|
+
"openshift",
|
|
1522
|
+
"openwrt",
|
|
1523
|
+
"option",
|
|
1524
|
+
"oracle",
|
|
1525
|
+
"org-",
|
|
1526
|
+
"org.",
|
|
1527
|
+
"org_",
|
|
1528
|
+
"origin",
|
|
1529
|
+
"original",
|
|
1530
|
+
"orm-",
|
|
1531
|
+
"orm.",
|
|
1532
|
+
"orm_",
|
|
1533
|
+
"osx-",
|
|
1534
|
+
"osx_",
|
|
1535
|
+
"our-",
|
|
1536
|
+
"our.",
|
|
1537
|
+
"our_",
|
|
1538
|
+
"out-",
|
|
1539
|
+
"out.",
|
|
1540
|
+
"out_",
|
|
1541
|
+
"output",
|
|
1542
|
+
"over",
|
|
1543
|
+
"overview",
|
|
1544
|
+
"own-",
|
|
1545
|
+
"own.",
|
|
1546
|
+
"own_",
|
|
1547
|
+
"pack",
|
|
1548
|
+
"package",
|
|
1549
|
+
"packet",
|
|
1550
|
+
"page",
|
|
1551
|
+
"panel",
|
|
1552
|
+
"paper",
|
|
1553
|
+
"paperclip",
|
|
1554
|
+
"para",
|
|
1555
|
+
"parallax",
|
|
1556
|
+
"parallel",
|
|
1557
|
+
"parse",
|
|
1558
|
+
"parser",
|
|
1559
|
+
"parsing",
|
|
1560
|
+
"particle",
|
|
1561
|
+
"party",
|
|
1562
|
+
"password",
|
|
1563
|
+
"patch",
|
|
1564
|
+
"path",
|
|
1565
|
+
"pattern",
|
|
1566
|
+
"payment",
|
|
1567
|
+
"paypal",
|
|
1568
|
+
"pdf-",
|
|
1569
|
+
"pdf.",
|
|
1570
|
+
"pdf_",
|
|
1571
|
+
"pebble",
|
|
1572
|
+
"people",
|
|
1573
|
+
"perl",
|
|
1574
|
+
"personal",
|
|
1575
|
+
"phalcon",
|
|
1576
|
+
"phoenix",
|
|
1577
|
+
"phone",
|
|
1578
|
+
"phonegap",
|
|
1579
|
+
"photo",
|
|
1580
|
+
"php-",
|
|
1581
|
+
"php.",
|
|
1582
|
+
"php_",
|
|
1583
|
+
"physic",
|
|
1584
|
+
"picker",
|
|
1585
|
+
"pipeline",
|
|
1586
|
+
"platform",
|
|
1587
|
+
"play",
|
|
1588
|
+
"player",
|
|
1589
|
+
"please",
|
|
1590
|
+
"plu-",
|
|
1591
|
+
"plu.",
|
|
1592
|
+
"plu_",
|
|
1593
|
+
"plug-in",
|
|
1594
|
+
"plugin",
|
|
1595
|
+
"plupload",
|
|
1596
|
+
"png-",
|
|
1597
|
+
"png.",
|
|
1598
|
+
"png_",
|
|
1599
|
+
"poker",
|
|
1600
|
+
"polyfill",
|
|
1601
|
+
"polymer",
|
|
1602
|
+
"pool",
|
|
1603
|
+
"pop-",
|
|
1604
|
+
"pop.",
|
|
1605
|
+
"pop_",
|
|
1606
|
+
"popcorn",
|
|
1607
|
+
"popup",
|
|
1608
|
+
"port",
|
|
1609
|
+
"portable",
|
|
1610
|
+
"portal",
|
|
1611
|
+
"portfolio",
|
|
1612
|
+
"post",
|
|
1613
|
+
"power",
|
|
1614
|
+
"powered",
|
|
1615
|
+
"powerful",
|
|
1616
|
+
"prelude",
|
|
1617
|
+
"pretty",
|
|
1618
|
+
"preview",
|
|
1619
|
+
"principle",
|
|
1620
|
+
"print",
|
|
1621
|
+
"pro-",
|
|
1622
|
+
"pro.",
|
|
1623
|
+
"pro_",
|
|
1624
|
+
"problem",
|
|
1625
|
+
"proc",
|
|
1626
|
+
"product",
|
|
1627
|
+
"profile",
|
|
1628
|
+
"profiler",
|
|
1629
|
+
"program",
|
|
1630
|
+
"progres",
|
|
1631
|
+
"project",
|
|
1632
|
+
"protocol",
|
|
1633
|
+
"prototype",
|
|
1634
|
+
"provider",
|
|
1635
|
+
"proxy",
|
|
1636
|
+
"public",
|
|
1637
|
+
"pull",
|
|
1638
|
+
"puppet",
|
|
1639
|
+
"pure",
|
|
1640
|
+
"purpose",
|
|
1641
|
+
"push",
|
|
1642
|
+
"pusher",
|
|
1643
|
+
"pyramid",
|
|
1644
|
+
"python",
|
|
1645
|
+
"quality",
|
|
1646
|
+
"query",
|
|
1647
|
+
"queue",
|
|
1648
|
+
"quick",
|
|
1649
|
+
"rabbitmq",
|
|
1650
|
+
"rack",
|
|
1651
|
+
"radio",
|
|
1652
|
+
"rail",
|
|
1653
|
+
"railscast",
|
|
1654
|
+
"random",
|
|
1655
|
+
"range",
|
|
1656
|
+
"raspberry",
|
|
1657
|
+
"rdf-",
|
|
1658
|
+
"rdf.",
|
|
1659
|
+
"rdf_",
|
|
1660
|
+
"react",
|
|
1661
|
+
"reactive",
|
|
1662
|
+
"read",
|
|
1663
|
+
"reader",
|
|
1664
|
+
"readme",
|
|
1665
|
+
"ready",
|
|
1666
|
+
"real",
|
|
1667
|
+
"real-time",
|
|
1668
|
+
"reality",
|
|
1669
|
+
"realtime",
|
|
1670
|
+
"recipe",
|
|
1671
|
+
"recorder",
|
|
1672
|
+
"red-",
|
|
1673
|
+
"red.",
|
|
1674
|
+
"red_",
|
|
1675
|
+
"reddit",
|
|
1676
|
+
"redi",
|
|
1677
|
+
"redmine",
|
|
1678
|
+
"reference",
|
|
1679
|
+
"refinery",
|
|
1680
|
+
"refresh",
|
|
1681
|
+
"registry",
|
|
1682
|
+
"related",
|
|
1683
|
+
"release",
|
|
1684
|
+
"remote",
|
|
1685
|
+
"rendering",
|
|
1686
|
+
"repo",
|
|
1687
|
+
"report",
|
|
1688
|
+
"request",
|
|
1689
|
+
"require",
|
|
1690
|
+
"required",
|
|
1691
|
+
"requirej",
|
|
1692
|
+
"research",
|
|
1693
|
+
"resource",
|
|
1694
|
+
"response",
|
|
1695
|
+
"resque",
|
|
1696
|
+
"rest",
|
|
1697
|
+
"restful",
|
|
1698
|
+
"resume",
|
|
1699
|
+
"reveal",
|
|
1700
|
+
"reverse",
|
|
1701
|
+
"review",
|
|
1702
|
+
"riak",
|
|
1703
|
+
"rich",
|
|
1704
|
+
"right",
|
|
1705
|
+
"ring",
|
|
1706
|
+
"robot",
|
|
1707
|
+
"role",
|
|
1708
|
+
"room",
|
|
1709
|
+
"router",
|
|
1710
|
+
"routing",
|
|
1711
|
+
"rpc-",
|
|
1712
|
+
"rpc.",
|
|
1713
|
+
"rpc_",
|
|
1714
|
+
"rpg-",
|
|
1715
|
+
"rpg.",
|
|
1716
|
+
"rpg_",
|
|
1717
|
+
"rspec",
|
|
1718
|
+
"ruby-",
|
|
1719
|
+
"ruby.",
|
|
1720
|
+
"ruby_",
|
|
1721
|
+
"rule",
|
|
1722
|
+
"run-",
|
|
1723
|
+
"run.",
|
|
1724
|
+
"run_",
|
|
1725
|
+
"runner",
|
|
1726
|
+
"running",
|
|
1727
|
+
"runtime",
|
|
1728
|
+
"rust",
|
|
1729
|
+
"rvm-",
|
|
1730
|
+
"rvm.",
|
|
1731
|
+
"rvm_",
|
|
1732
|
+
"salt",
|
|
1733
|
+
"sample",
|
|
1734
|
+
"sandbox",
|
|
1735
|
+
"sas-",
|
|
1736
|
+
"sas.",
|
|
1737
|
+
"sas_",
|
|
1738
|
+
"sbt-",
|
|
1739
|
+
"sbt.",
|
|
1740
|
+
"sbt_",
|
|
1741
|
+
"scala",
|
|
1742
|
+
"scalable",
|
|
1743
|
+
"scanner",
|
|
1744
|
+
"schema",
|
|
1745
|
+
"scheme",
|
|
1746
|
+
"school",
|
|
1747
|
+
"science",
|
|
1748
|
+
"scraper",
|
|
1749
|
+
"scratch",
|
|
1750
|
+
"screen",
|
|
1751
|
+
"script",
|
|
1752
|
+
"scroll",
|
|
1753
|
+
"scs-",
|
|
1754
|
+
"scs.",
|
|
1755
|
+
"scs_",
|
|
1756
|
+
"sdk-",
|
|
1757
|
+
"sdk.",
|
|
1758
|
+
"sdk_",
|
|
1759
|
+
"sdl-",
|
|
1760
|
+
"sdl.",
|
|
1761
|
+
"sdl_",
|
|
1762
|
+
"search",
|
|
1763
|
+
"secure",
|
|
1764
|
+
"security",
|
|
1765
|
+
"see-",
|
|
1766
|
+
"see.",
|
|
1767
|
+
"see_",
|
|
1768
|
+
"seed",
|
|
1769
|
+
"select",
|
|
1770
|
+
"selector",
|
|
1771
|
+
"selenium",
|
|
1772
|
+
"semantic",
|
|
1773
|
+
"sencha",
|
|
1774
|
+
"send",
|
|
1775
|
+
"sentiment",
|
|
1776
|
+
"serie",
|
|
1777
|
+
"server",
|
|
1778
|
+
"service",
|
|
1779
|
+
"session",
|
|
1780
|
+
"set-",
|
|
1781
|
+
"set.",
|
|
1782
|
+
"set_",
|
|
1783
|
+
"setting",
|
|
1784
|
+
"setup",
|
|
1785
|
+
"sha1",
|
|
1786
|
+
"sha2",
|
|
1787
|
+
"sha256",
|
|
1788
|
+
"share",
|
|
1789
|
+
"shared",
|
|
1790
|
+
"sharing",
|
|
1791
|
+
"sheet",
|
|
1792
|
+
"shell",
|
|
1793
|
+
"shield",
|
|
1794
|
+
"shipping",
|
|
1795
|
+
"shop",
|
|
1796
|
+
"shopify",
|
|
1797
|
+
"shortener",
|
|
1798
|
+
"should",
|
|
1799
|
+
"show",
|
|
1800
|
+
"showcase",
|
|
1801
|
+
"side",
|
|
1802
|
+
"silex",
|
|
1803
|
+
"simple",
|
|
1804
|
+
"simulator",
|
|
1805
|
+
"single",
|
|
1806
|
+
"site",
|
|
1807
|
+
"skeleton",
|
|
1808
|
+
"sketch",
|
|
1809
|
+
"skin",
|
|
1810
|
+
"slack",
|
|
1811
|
+
"slide",
|
|
1812
|
+
"slider",
|
|
1813
|
+
"slim",
|
|
1814
|
+
"small",
|
|
1815
|
+
"smart",
|
|
1816
|
+
"smtp",
|
|
1817
|
+
"snake",
|
|
1818
|
+
"snapshot",
|
|
1819
|
+
"snippet",
|
|
1820
|
+
"soap",
|
|
1821
|
+
"social",
|
|
1822
|
+
"socket",
|
|
1823
|
+
"software",
|
|
1824
|
+
"solarized",
|
|
1825
|
+
"solr",
|
|
1826
|
+
"solution",
|
|
1827
|
+
"solver",
|
|
1828
|
+
"some",
|
|
1829
|
+
"soon",
|
|
1830
|
+
"source",
|
|
1831
|
+
"space",
|
|
1832
|
+
"spark",
|
|
1833
|
+
"spatial",
|
|
1834
|
+
"spec",
|
|
1835
|
+
"sphinx",
|
|
1836
|
+
"spine",
|
|
1837
|
+
"spotify",
|
|
1838
|
+
"spree",
|
|
1839
|
+
"spring",
|
|
1840
|
+
"sprite",
|
|
1841
|
+
"sql-",
|
|
1842
|
+
"sql.",
|
|
1843
|
+
"sql_",
|
|
1844
|
+
"sqlite",
|
|
1845
|
+
"ssh-",
|
|
1846
|
+
"ssh.",
|
|
1847
|
+
"ssh_",
|
|
1848
|
+
"stack",
|
|
1849
|
+
"staging",
|
|
1850
|
+
"standard",
|
|
1851
|
+
"stanford",
|
|
1852
|
+
"start",
|
|
1853
|
+
"started",
|
|
1854
|
+
"starter",
|
|
1855
|
+
"startup",
|
|
1856
|
+
"stat",
|
|
1857
|
+
"statamic",
|
|
1858
|
+
"state",
|
|
1859
|
+
"static",
|
|
1860
|
+
"statistic",
|
|
1861
|
+
"statsd",
|
|
1862
|
+
"statu",
|
|
1863
|
+
"steam",
|
|
1864
|
+
"step",
|
|
1865
|
+
"still",
|
|
1866
|
+
"stm-",
|
|
1867
|
+
"stm.",
|
|
1868
|
+
"stm_",
|
|
1869
|
+
"storage",
|
|
1870
|
+
"store",
|
|
1871
|
+
"storm",
|
|
1872
|
+
"story",
|
|
1873
|
+
"strategy",
|
|
1874
|
+
"stream",
|
|
1875
|
+
"streaming",
|
|
1876
|
+
"string",
|
|
1877
|
+
"stripe",
|
|
1878
|
+
"structure",
|
|
1879
|
+
"studio",
|
|
1880
|
+
"study",
|
|
1881
|
+
"stuff",
|
|
1882
|
+
"style",
|
|
1883
|
+
"sublime",
|
|
1884
|
+
"sugar",
|
|
1885
|
+
"suite",
|
|
1886
|
+
"summary",
|
|
1887
|
+
"super",
|
|
1888
|
+
"support",
|
|
1889
|
+
"supported",
|
|
1890
|
+
"svg-",
|
|
1891
|
+
"svg.",
|
|
1892
|
+
"svg_",
|
|
1893
|
+
"svn-",
|
|
1894
|
+
"svn.",
|
|
1895
|
+
"svn_",
|
|
1896
|
+
"swagger",
|
|
1897
|
+
"swift",
|
|
1898
|
+
"switch",
|
|
1899
|
+
"switcher",
|
|
1900
|
+
"symfony",
|
|
1901
|
+
"symphony",
|
|
1902
|
+
"sync",
|
|
1903
|
+
"synopsi",
|
|
1904
|
+
"syntax",
|
|
1905
|
+
"system",
|
|
1906
|
+
"tab-",
|
|
1907
|
+
"tab.",
|
|
1908
|
+
"tab_",
|
|
1909
|
+
"table",
|
|
1910
|
+
"tag-",
|
|
1911
|
+
"tag.",
|
|
1912
|
+
"tag_",
|
|
1913
|
+
"talk",
|
|
1914
|
+
"target",
|
|
1915
|
+
"task",
|
|
1916
|
+
"tcp-",
|
|
1917
|
+
"tcp.",
|
|
1918
|
+
"tcp_",
|
|
1919
|
+
"tdd-",
|
|
1920
|
+
"tdd.",
|
|
1921
|
+
"tdd_",
|
|
1922
|
+
"team",
|
|
1923
|
+
"tech",
|
|
1924
|
+
"template",
|
|
1925
|
+
"term",
|
|
1926
|
+
"terminal",
|
|
1927
|
+
"testing",
|
|
1928
|
+
"tetri",
|
|
1929
|
+
"text",
|
|
1930
|
+
"textmate",
|
|
1931
|
+
"theme",
|
|
1932
|
+
"theory",
|
|
1933
|
+
"three",
|
|
1934
|
+
"thrift",
|
|
1935
|
+
"time",
|
|
1936
|
+
"timeline",
|
|
1937
|
+
"timer",
|
|
1938
|
+
"tiny",
|
|
1939
|
+
"tinymce",
|
|
1940
|
+
"tip-",
|
|
1941
|
+
"tip.",
|
|
1942
|
+
"tip_",
|
|
1943
|
+
"title",
|
|
1944
|
+
"todo",
|
|
1945
|
+
"todomvc",
|
|
1946
|
+
"token",
|
|
1947
|
+
"tool",
|
|
1948
|
+
"toolbox",
|
|
1949
|
+
"toolkit",
|
|
1950
|
+
"top-",
|
|
1951
|
+
"top.",
|
|
1952
|
+
"top_",
|
|
1953
|
+
"tornado",
|
|
1954
|
+
"touch",
|
|
1955
|
+
"tower",
|
|
1956
|
+
"tracker",
|
|
1957
|
+
"tracking",
|
|
1958
|
+
"traffic",
|
|
1959
|
+
"training",
|
|
1960
|
+
"transfer",
|
|
1961
|
+
"translate",
|
|
1962
|
+
"transport",
|
|
1963
|
+
"tree",
|
|
1964
|
+
"trello",
|
|
1965
|
+
"try-",
|
|
1966
|
+
"try.",
|
|
1967
|
+
"try_",
|
|
1968
|
+
"tumblr",
|
|
1969
|
+
"tut-",
|
|
1970
|
+
"tut.",
|
|
1971
|
+
"tut_",
|
|
1972
|
+
"tutorial",
|
|
1973
|
+
"tweet",
|
|
1974
|
+
"twig",
|
|
1975
|
+
"twitter",
|
|
1976
|
+
"type",
|
|
1977
|
+
"typo",
|
|
1978
|
+
"ubuntu",
|
|
1979
|
+
"uiview",
|
|
1980
|
+
"ultimate",
|
|
1981
|
+
"under",
|
|
1982
|
+
"unit",
|
|
1983
|
+
"unity",
|
|
1984
|
+
"universal",
|
|
1985
|
+
"unix",
|
|
1986
|
+
"update",
|
|
1987
|
+
"updated",
|
|
1988
|
+
"upgrade",
|
|
1989
|
+
"upload",
|
|
1990
|
+
"uploader",
|
|
1991
|
+
"uri-",
|
|
1992
|
+
"uri.",
|
|
1993
|
+
"uri_",
|
|
1994
|
+
"url-",
|
|
1995
|
+
"url.",
|
|
1996
|
+
"url_",
|
|
1997
|
+
"usage",
|
|
1998
|
+
"usb-",
|
|
1999
|
+
"usb.",
|
|
2000
|
+
"usb_",
|
|
2001
|
+
"use-",
|
|
2002
|
+
"use.",
|
|
2003
|
+
"use_",
|
|
2004
|
+
"used",
|
|
2005
|
+
"useful",
|
|
2006
|
+
"user",
|
|
2007
|
+
"using",
|
|
2008
|
+
"util",
|
|
2009
|
+
"utilitie",
|
|
2010
|
+
"utility",
|
|
2011
|
+
"vagrant",
|
|
2012
|
+
"validator",
|
|
2013
|
+
"value",
|
|
2014
|
+
"variou",
|
|
2015
|
+
"varnish",
|
|
2016
|
+
"version",
|
|
2017
|
+
"via-",
|
|
2018
|
+
"via.",
|
|
2019
|
+
"via_",
|
|
2020
|
+
"video",
|
|
2021
|
+
"view",
|
|
2022
|
+
"viewer",
|
|
2023
|
+
"vim-",
|
|
2024
|
+
"vim.",
|
|
2025
|
+
"vim_",
|
|
2026
|
+
"vimrc",
|
|
2027
|
+
"virtual",
|
|
2028
|
+
"vision",
|
|
2029
|
+
"visual",
|
|
2030
|
+
"vpn",
|
|
2031
|
+
"want",
|
|
2032
|
+
"warning",
|
|
2033
|
+
"watch",
|
|
2034
|
+
"watcher",
|
|
2035
|
+
"wave",
|
|
2036
|
+
"way-",
|
|
2037
|
+
"way.",
|
|
2038
|
+
"way_",
|
|
2039
|
+
"weather",
|
|
2040
|
+
"web-",
|
|
2041
|
+
"web_",
|
|
2042
|
+
"webapp",
|
|
2043
|
+
"webgl",
|
|
2044
|
+
"webhook",
|
|
2045
|
+
"webkit",
|
|
2046
|
+
"webrtc",
|
|
2047
|
+
"website",
|
|
2048
|
+
"websocket",
|
|
2049
|
+
"welcome",
|
|
2050
|
+
"what",
|
|
2051
|
+
"what'",
|
|
2052
|
+
"when",
|
|
2053
|
+
"where",
|
|
2054
|
+
"which",
|
|
2055
|
+
"why-",
|
|
2056
|
+
"why.",
|
|
2057
|
+
"why_",
|
|
2058
|
+
"widget",
|
|
2059
|
+
"wifi",
|
|
2060
|
+
"wiki",
|
|
2061
|
+
"win-",
|
|
2062
|
+
"win.",
|
|
2063
|
+
"win_",
|
|
2064
|
+
"window",
|
|
2065
|
+
"wip-",
|
|
2066
|
+
"wip.",
|
|
2067
|
+
"wip_",
|
|
2068
|
+
"within",
|
|
2069
|
+
"without",
|
|
2070
|
+
"wizard",
|
|
2071
|
+
"word",
|
|
2072
|
+
"wordpres",
|
|
2073
|
+
"work",
|
|
2074
|
+
"worker",
|
|
2075
|
+
"workflow",
|
|
2076
|
+
"working",
|
|
2077
|
+
"workshop",
|
|
2078
|
+
"world",
|
|
2079
|
+
"wrapper",
|
|
2080
|
+
"write",
|
|
2081
|
+
"writer",
|
|
2082
|
+
"writing",
|
|
2083
|
+
"written",
|
|
2084
|
+
"www-",
|
|
2085
|
+
"www.",
|
|
2086
|
+
"www_",
|
|
2087
|
+
"xamarin",
|
|
2088
|
+
"xcode",
|
|
2089
|
+
"xml-",
|
|
2090
|
+
"xml.",
|
|
2091
|
+
"xml_",
|
|
2092
|
+
"xmpp",
|
|
2093
|
+
"xxxxxx",
|
|
2094
|
+
"yahoo",
|
|
2095
|
+
"yaml",
|
|
2096
|
+
"yandex",
|
|
2097
|
+
"yeoman",
|
|
2098
|
+
"yet-",
|
|
2099
|
+
"yet.",
|
|
2100
|
+
"yet_",
|
|
2101
|
+
"yii-",
|
|
2102
|
+
"yii.",
|
|
2103
|
+
"yii_",
|
|
2104
|
+
"youtube",
|
|
2105
|
+
"yui-",
|
|
2106
|
+
"yui.",
|
|
2107
|
+
"yui_",
|
|
2108
|
+
"zend",
|
|
2109
|
+
"zero",
|
|
2110
|
+
"zip-",
|
|
2111
|
+
"zip.",
|
|
2112
|
+
"zip_",
|
|
2113
|
+
"zsh-",
|
|
2114
|
+
"zsh.",
|
|
2115
|
+
"zsh_",
|
|
2116
|
+
]
|
|
2117
|
+
[[rules.allowlists]]
|
|
2118
|
+
regexTarget = "line"
|
|
2119
|
+
regexes = [
|
|
2120
|
+
'''--mount=type=secret,''',
|
|
2121
|
+
'''import[ \t]+{[ \t\w,]+}[ \t]+from[ \t]+['"][^'"]+['"]''',
|
|
2122
|
+
]
|
|
2123
|
+
[[rules.allowlists]]
|
|
2124
|
+
condition = "AND"
|
|
2125
|
+
paths = [
|
|
2126
|
+
'''\.bb$''','''\.bbappend$''','''\.bbclass$''','''\.inc$''',
|
|
2127
|
+
]
|
|
2128
|
+
regexTarget = "line"
|
|
2129
|
+
regexes = [
|
|
2130
|
+
'''LICENSE[^=]*=\s*"[^"]+''',
|
|
2131
|
+
'''LIC_FILES_CHKSUM[^=]*=\s*"[^"]+''',
|
|
2132
|
+
'''SRC[^=]*=\s*"[a-zA-Z0-9]+''',
|
|
2133
|
+
]
|
|
2134
|
+
|
|
2135
|
+
[[rules]]
|
|
2136
|
+
id = "github-app-token"
|
|
2137
|
+
description = "Identified a GitHub App Token, which may compromise GitHub application integrations and source code security."
|
|
2138
|
+
regex = '''(?:ghu|ghs)_[0-9a-zA-Z]{36}'''
|
|
2139
|
+
entropy = 3
|
|
2140
|
+
keywords = [
|
|
2141
|
+
"ghu_",
|
|
2142
|
+
"ghs_",
|
|
2143
|
+
]
|
|
2144
|
+
[[rules.allowlists]]
|
|
2145
|
+
paths = [
|
|
2146
|
+
'''(?:^|/)@octokit/auth-token/README\.md$''',
|
|
2147
|
+
]
|
|
2148
|
+
|
|
2149
|
+
[[rules]]
|
|
2150
|
+
id = "github-fine-grained-pat"
|
|
2151
|
+
description = "Found a GitHub Fine-Grained Personal Access Token, risking unauthorized repository access and code manipulation."
|
|
2152
|
+
regex = '''github_pat_\w{82}'''
|
|
2153
|
+
entropy = 3
|
|
2154
|
+
keywords = ["github_pat_"]
|
|
2155
|
+
|
|
2156
|
+
[[rules]]
|
|
2157
|
+
id = "github-oauth"
|
|
2158
|
+
description = "Discovered a GitHub OAuth Access Token, posing a risk of compromised GitHub account integrations and data leaks."
|
|
2159
|
+
regex = '''gho_[0-9a-zA-Z]{36}'''
|
|
2160
|
+
entropy = 3
|
|
2161
|
+
keywords = ["gho_"]
|
|
2162
|
+
|
|
2163
|
+
[[rules]]
|
|
2164
|
+
id = "github-pat"
|
|
2165
|
+
description = "Uncovered a GitHub Personal Access Token, potentially leading to unauthorized repository access and sensitive content exposure."
|
|
2166
|
+
regex = '''ghp_[0-9a-zA-Z]{36}'''
|
|
2167
|
+
entropy = 3
|
|
2168
|
+
keywords = ["ghp_"]
|
|
2169
|
+
[[rules.allowlists]]
|
|
2170
|
+
paths = [
|
|
2171
|
+
'''(?:^|/)@octokit/auth-token/README\.md$''',
|
|
2172
|
+
]
|
|
2173
|
+
|
|
2174
|
+
[[rules]]
|
|
2175
|
+
id = "github-refresh-token"
|
|
2176
|
+
description = "Detected a GitHub Refresh Token, which could allow prolonged unauthorized access to GitHub services."
|
|
2177
|
+
regex = '''ghr_[0-9a-zA-Z]{36}'''
|
|
2178
|
+
entropy = 3
|
|
2179
|
+
keywords = ["ghr_"]
|
|
2180
|
+
|
|
2181
|
+
[[rules]]
|
|
2182
|
+
id = "gitlab-cicd-job-token"
|
|
2183
|
+
description = "Identified a GitLab CI/CD Job Token, potential access to projects and some APIs on behalf of a user while the CI job is running."
|
|
2184
|
+
regex = '''glcbt-[0-9a-zA-Z]{1,5}_[0-9a-zA-Z_-]{20}'''
|
|
2185
|
+
entropy = 3
|
|
2186
|
+
keywords = ["glcbt-"]
|
|
2187
|
+
|
|
2188
|
+
[[rules]]
|
|
2189
|
+
id = "gitlab-deploy-token"
|
|
2190
|
+
description = "Identified a GitLab Deploy Token, risking access to repositories, packages and containers with write access."
|
|
2191
|
+
regex = '''gldt-[0-9a-zA-Z_\-]{20}'''
|
|
2192
|
+
entropy = 3
|
|
2193
|
+
keywords = ["gldt-"]
|
|
2194
|
+
|
|
2195
|
+
[[rules]]
|
|
2196
|
+
id = "gitlab-feature-flag-client-token"
|
|
2197
|
+
description = "Identified a GitLab feature flag client token, risks exposing user lists and features flags used by an application."
|
|
2198
|
+
regex = '''glffct-[0-9a-zA-Z_\-]{20}'''
|
|
2199
|
+
entropy = 3
|
|
2200
|
+
keywords = ["glffct-"]
|
|
2201
|
+
|
|
2202
|
+
[[rules]]
|
|
2203
|
+
id = "gitlab-feed-token"
|
|
2204
|
+
description = "Identified a GitLab feed token, risking exposure of user data."
|
|
2205
|
+
regex = '''glft-[0-9a-zA-Z_\-]{20}'''
|
|
2206
|
+
entropy = 3
|
|
2207
|
+
keywords = ["glft-"]
|
|
2208
|
+
|
|
2209
|
+
[[rules]]
|
|
2210
|
+
id = "gitlab-incoming-mail-token"
|
|
2211
|
+
description = "Identified a GitLab incoming mail token, risking manipulation of data sent by mail."
|
|
2212
|
+
regex = '''glimt-[0-9a-zA-Z_\-]{25}'''
|
|
2213
|
+
entropy = 3
|
|
2214
|
+
keywords = ["glimt-"]
|
|
2215
|
+
|
|
2216
|
+
[[rules]]
|
|
2217
|
+
id = "gitlab-kubernetes-agent-token"
|
|
2218
|
+
description = "Identified a GitLab Kubernetes Agent token, risking access to repos and registry of projects connected via agent."
|
|
2219
|
+
regex = '''glagent-[0-9a-zA-Z_\-]{50}'''
|
|
2220
|
+
entropy = 3
|
|
2221
|
+
keywords = ["glagent-"]
|
|
2222
|
+
|
|
2223
|
+
[[rules]]
|
|
2224
|
+
id = "gitlab-oauth-app-secret"
|
|
2225
|
+
description = "Identified a GitLab OIDC Application Secret, risking access to apps using GitLab as authentication provider."
|
|
2226
|
+
regex = '''gloas-[0-9a-zA-Z_\-]{64}'''
|
|
2227
|
+
entropy = 3
|
|
2228
|
+
keywords = ["gloas-"]
|
|
2229
|
+
|
|
2230
|
+
[[rules]]
|
|
2231
|
+
id = "gitlab-pat"
|
|
2232
|
+
description = "Identified a GitLab Personal Access Token, risking unauthorized access to GitLab repositories and codebase exposure."
|
|
2233
|
+
regex = '''glpat-[\w-]{20}'''
|
|
2234
|
+
entropy = 3
|
|
2235
|
+
keywords = ["glpat-"]
|
|
2236
|
+
|
|
2237
|
+
[[rules]]
|
|
2238
|
+
id = "gitlab-pat-routable"
|
|
2239
|
+
description = "Identified a GitLab Personal Access Token (routable), risking unauthorized access to GitLab repositories and codebase exposure."
|
|
2240
|
+
regex = '''\bglpat-[0-9a-zA-Z_-]{27,300}\.[0-9a-z]{2}[0-9a-z]{7}\b'''
|
|
2241
|
+
entropy = 4
|
|
2242
|
+
keywords = ["glpat-"]
|
|
2243
|
+
|
|
2244
|
+
[[rules]]
|
|
2245
|
+
id = "gitlab-ptt"
|
|
2246
|
+
description = "Found a GitLab Pipeline Trigger Token, potentially compromising continuous integration workflows and project security."
|
|
2247
|
+
regex = '''glptt-[0-9a-f]{40}'''
|
|
2248
|
+
entropy = 3
|
|
2249
|
+
keywords = ["glptt-"]
|
|
2250
|
+
|
|
2251
|
+
[[rules]]
|
|
2252
|
+
id = "gitlab-rrt"
|
|
2253
|
+
description = "Discovered a GitLab Runner Registration Token, posing a risk to CI/CD pipeline integrity and unauthorized access."
|
|
2254
|
+
regex = '''GR1348941[\w-]{20}'''
|
|
2255
|
+
entropy = 3
|
|
2256
|
+
keywords = ["gr1348941"]
|
|
2257
|
+
|
|
2258
|
+
[[rules]]
|
|
2259
|
+
id = "gitlab-runner-authentication-token"
|
|
2260
|
+
description = "Discovered a GitLab Runner Authentication Token, posing a risk to CI/CD pipeline integrity and unauthorized access."
|
|
2261
|
+
regex = '''glrt-[0-9a-zA-Z_\-]{20}'''
|
|
2262
|
+
entropy = 3
|
|
2263
|
+
keywords = ["glrt-"]
|
|
2264
|
+
|
|
2265
|
+
[[rules]]
|
|
2266
|
+
id = "gitlab-runner-authentication-token-routable"
|
|
2267
|
+
description = "Discovered a GitLab Runner Authentication Token (Routable), posing a risk to CI/CD pipeline integrity and unauthorized access."
|
|
2268
|
+
regex = '''\bglrt-t\d_[0-9a-zA-Z_\-]{27,300}\.[0-9a-z]{2}[0-9a-z]{7}\b'''
|
|
2269
|
+
entropy = 4
|
|
2270
|
+
keywords = ["glrt-"]
|
|
2271
|
+
|
|
2272
|
+
[[rules]]
|
|
2273
|
+
id = "gitlab-scim-token"
|
|
2274
|
+
description = "Discovered a GitLab SCIM Token, posing a risk to unauthorized access for a organization or instance."
|
|
2275
|
+
regex = '''glsoat-[0-9a-zA-Z_\-]{20}'''
|
|
2276
|
+
entropy = 3
|
|
2277
|
+
keywords = ["glsoat-"]
|
|
2278
|
+
|
|
2279
|
+
[[rules]]
|
|
2280
|
+
id = "gitlab-session-cookie"
|
|
2281
|
+
description = "Discovered a GitLab Session Cookie, posing a risk to unauthorized access to a user account."
|
|
2282
|
+
regex = '''_gitlab_session=[0-9a-z]{32}'''
|
|
2283
|
+
entropy = 3
|
|
2284
|
+
keywords = ["_gitlab_session="]
|
|
2285
|
+
|
|
2286
|
+
[[rules]]
|
|
2287
|
+
id = "gitter-access-token"
|
|
2288
|
+
description = "Uncovered a Gitter Access Token, which may lead to unauthorized access to chat and communication services."
|
|
2289
|
+
regex = '''(?i)[\w.-]{0,50}?(?:gitter)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9_-]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2290
|
+
keywords = ["gitter"]
|
|
2291
|
+
|
|
2292
|
+
[[rules]]
|
|
2293
|
+
id = "gocardless-api-token"
|
|
2294
|
+
description = "Detected a GoCardless API token, potentially risking unauthorized direct debit payment operations and financial data exposure."
|
|
2295
|
+
regex = '''(?i)[\w.-]{0,50}?(?:gocardless)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(live_(?i)[a-z0-9\-_=]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2296
|
+
keywords = [
|
|
2297
|
+
"live_",
|
|
2298
|
+
"gocardless",
|
|
2299
|
+
]
|
|
2300
|
+
|
|
2301
|
+
[[rules]]
|
|
2302
|
+
id = "grafana-api-key"
|
|
2303
|
+
description = "Identified a Grafana API key, which could compromise monitoring dashboards and sensitive data analytics."
|
|
2304
|
+
regex = '''(?i)\b(eyJrIjoi[A-Za-z0-9]{70,400}={0,3})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2305
|
+
entropy = 3
|
|
2306
|
+
keywords = ["eyjrijoi"]
|
|
2307
|
+
|
|
2308
|
+
[[rules]]
|
|
2309
|
+
id = "grafana-cloud-api-token"
|
|
2310
|
+
description = "Found a Grafana cloud API token, risking unauthorized access to cloud-based monitoring services and data exposure."
|
|
2311
|
+
regex = '''(?i)\b(glc_[A-Za-z0-9+/]{32,400}={0,3})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2312
|
+
entropy = 3
|
|
2313
|
+
keywords = ["glc_"]
|
|
2314
|
+
|
|
2315
|
+
[[rules]]
|
|
2316
|
+
id = "grafana-service-account-token"
|
|
2317
|
+
description = "Discovered a Grafana service account token, posing a risk of compromised monitoring services and data integrity."
|
|
2318
|
+
regex = '''(?i)\b(glsa_[A-Za-z0-9]{32}_[A-Fa-f0-9]{8})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2319
|
+
entropy = 3
|
|
2320
|
+
keywords = ["glsa_"]
|
|
2321
|
+
|
|
2322
|
+
[[rules]]
|
|
2323
|
+
id = "harness-api-key"
|
|
2324
|
+
description = "Identified a Harness Access Token (PAT or SAT), risking unauthorized access to a Harness account."
|
|
2325
|
+
regex = '''(?:pat|sat)\.[a-zA-Z0-9_-]{22}\.[a-zA-Z0-9]{24}\.[a-zA-Z0-9]{20}'''
|
|
2326
|
+
keywords = [
|
|
2327
|
+
"pat.",
|
|
2328
|
+
"sat.",
|
|
2329
|
+
]
|
|
2330
|
+
|
|
2331
|
+
[[rules]]
|
|
2332
|
+
id = "hashicorp-tf-api-token"
|
|
2333
|
+
description = "Uncovered a HashiCorp Terraform user/org API token, which may lead to unauthorized infrastructure management and security breaches."
|
|
2334
|
+
regex = '''(?i)[a-z0-9]{14}\.(?-i:atlasv1)\.[a-z0-9\-_=]{60,70}'''
|
|
2335
|
+
entropy = 3.5
|
|
2336
|
+
keywords = ["atlasv1"]
|
|
2337
|
+
|
|
2338
|
+
[[rules]]
|
|
2339
|
+
id = "hashicorp-tf-password"
|
|
2340
|
+
description = "Identified a HashiCorp Terraform password field, risking unauthorized infrastructure configuration and security breaches."
|
|
2341
|
+
regex = '''(?i)[\w.-]{0,50}?(?:administrator_login_password|password)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}("[a-z0-9=_\-]{8,20}")(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2342
|
+
path = '''(?i)\.(?:tf|hcl)$'''
|
|
2343
|
+
entropy = 2
|
|
2344
|
+
keywords = [
|
|
2345
|
+
"administrator_login_password",
|
|
2346
|
+
"password",
|
|
2347
|
+
]
|
|
2348
|
+
|
|
2349
|
+
[[rules]]
|
|
2350
|
+
id = "heroku-api-key"
|
|
2351
|
+
description = "Detected a Heroku API Key, potentially compromising cloud application deployments and operational security."
|
|
2352
|
+
regex = '''(?i)[\w.-]{0,50}?(?:heroku)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2353
|
+
keywords = ["heroku"]
|
|
2354
|
+
|
|
2355
|
+
[[rules]]
|
|
2356
|
+
id = "heroku-api-key-v2"
|
|
2357
|
+
description = "Detected a Heroku API Key, potentially compromising cloud application deployments and operational security."
|
|
2358
|
+
regex = '''\b((HRKU-AA[0-9a-zA-Z_-]{58}))(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2359
|
+
entropy = 4
|
|
2360
|
+
keywords = ["hrku-aa"]
|
|
2361
|
+
|
|
2362
|
+
[[rules]]
|
|
2363
|
+
id = "hubspot-api-key"
|
|
2364
|
+
description = "Found a HubSpot API Token, posing a risk to CRM data integrity and unauthorized marketing operations."
|
|
2365
|
+
regex = '''(?i)[\w.-]{0,50}?(?:hubspot)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2366
|
+
keywords = ["hubspot"]
|
|
2367
|
+
|
|
2368
|
+
[[rules]]
|
|
2369
|
+
id = "huggingface-access-token"
|
|
2370
|
+
description = "Discovered a Hugging Face Access token, which could lead to unauthorized access to AI models and sensitive data."
|
|
2371
|
+
regex = '''\b(hf_(?i:[a-z]{34}))(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2372
|
+
entropy = 2
|
|
2373
|
+
keywords = ["hf_"]
|
|
2374
|
+
|
|
2375
|
+
[[rules]]
|
|
2376
|
+
id = "huggingface-organization-api-token"
|
|
2377
|
+
description = "Uncovered a Hugging Face Organization API token, potentially compromising AI organization accounts and associated data."
|
|
2378
|
+
regex = '''\b(api_org_(?i:[a-z]{34}))(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2379
|
+
entropy = 2
|
|
2380
|
+
keywords = ["api_org_"]
|
|
2381
|
+
|
|
2382
|
+
[[rules]]
|
|
2383
|
+
id = "infracost-api-token"
|
|
2384
|
+
description = "Detected an Infracost API Token, risking unauthorized access to cloud cost estimation tools and financial data."
|
|
2385
|
+
regex = '''\b(ico-[a-zA-Z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2386
|
+
entropy = 3
|
|
2387
|
+
keywords = ["ico-"]
|
|
2388
|
+
|
|
2389
|
+
[[rules]]
|
|
2390
|
+
id = "intercom-api-key"
|
|
2391
|
+
description = "Identified an Intercom API Token, which could compromise customer communication channels and data privacy."
|
|
2392
|
+
regex = '''(?i)[\w.-]{0,50}?(?:intercom)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9=_\-]{60})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2393
|
+
keywords = ["intercom"]
|
|
2394
|
+
|
|
2395
|
+
[[rules]]
|
|
2396
|
+
id = "intra42-client-secret"
|
|
2397
|
+
description = "Found a Intra42 client secret, which could lead to unauthorized access to the 42School API and sensitive data."
|
|
2398
|
+
regex = '''\b(s-s4t2(?:ud|af)-(?i)[abcdef0123456789]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2399
|
+
entropy = 3
|
|
2400
|
+
keywords = [
|
|
2401
|
+
"intra",
|
|
2402
|
+
"s-s4t2ud-",
|
|
2403
|
+
"s-s4t2af-",
|
|
2404
|
+
]
|
|
2405
|
+
|
|
2406
|
+
[[rules]]
|
|
2407
|
+
id = "jfrog-api-key"
|
|
2408
|
+
description = "Found a JFrog API Key, posing a risk of unauthorized access to software artifact repositories and build pipelines."
|
|
2409
|
+
regex = '''(?i)[\w.-]{0,50}?(?:jfrog|artifactory|bintray|xray)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{73})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2410
|
+
keywords = [
|
|
2411
|
+
"jfrog",
|
|
2412
|
+
"artifactory",
|
|
2413
|
+
"bintray",
|
|
2414
|
+
"xray",
|
|
2415
|
+
]
|
|
2416
|
+
|
|
2417
|
+
[[rules]]
|
|
2418
|
+
id = "jfrog-identity-token"
|
|
2419
|
+
description = "Discovered a JFrog Identity Token, potentially compromising access to JFrog services and sensitive software artifacts."
|
|
2420
|
+
regex = '''(?i)[\w.-]{0,50}?(?:jfrog|artifactory|bintray|xray)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2421
|
+
keywords = [
|
|
2422
|
+
"jfrog",
|
|
2423
|
+
"artifactory",
|
|
2424
|
+
"bintray",
|
|
2425
|
+
"xray",
|
|
2426
|
+
]
|
|
2427
|
+
|
|
2428
|
+
[[rules]]
|
|
2429
|
+
id = "jwt"
|
|
2430
|
+
description = "Uncovered a JSON Web Token, which may lead to unauthorized access to web applications and sensitive user data."
|
|
2431
|
+
regex = '''\b(ey[a-zA-Z0-9]{17,}\.ey[a-zA-Z0-9\/\\_-]{17,}\.(?:[a-zA-Z0-9\/\\_-]{10,}={0,2})?)(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2432
|
+
entropy = 3
|
|
2433
|
+
keywords = ["ey"]
|
|
2434
|
+
|
|
2435
|
+
[[rules]]
|
|
2436
|
+
id = "jwt-base64"
|
|
2437
|
+
description = "Detected a Base64-encoded JSON Web Token, posing a risk of exposing encoded authentication and data exchange information."
|
|
2438
|
+
regex = '''\bZXlK(?:(?P<alg>aGJHY2lPaU)|(?P<apu>aGNIVWlPaU)|(?P<apv>aGNIWWlPaU)|(?P<aud>aGRXUWlPaU)|(?P<b64>aU5qUWlP)|(?P<crit>amNtbDBJanBi)|(?P<cty>amRIa2lPaU)|(?P<epk>bGNHc2lPbn)|(?P<enc>bGJtTWlPaU)|(?P<jku>cWEzVWlPaU)|(?P<jwk>cWQyc2lPb)|(?P<iss>cGMzTWlPaU)|(?P<iv>cGRpSTZJ)|(?P<kid>cmFXUWlP)|(?P<key_ops>clpYbGZiM0J6SWpwY)|(?P<kty>cmRIa2lPaUp)|(?P<nonce>dWIyNWpaU0k2)|(?P<p2c>d01tTWlP)|(?P<p2s>d01uTWlPaU)|(?P<ppt>d2NIUWlPaU)|(?P<sub>emRXSWlPaU)|(?P<svt>emRuUWlP)|(?P<tag>MFlXY2lPaU)|(?P<typ>MGVYQWlPaUp)|(?P<url>MWNtd2l)|(?P<use>MWMyVWlPaUp)|(?P<ver>MlpYSWlPaU)|(?P<version>MlpYSnphVzl1SWpv)|(?P<x>NElqb2)|(?P<x5c>NE5XTWlP)|(?P<x5t>NE5YUWlPaU)|(?P<x5ts256>NE5YUWpVekkxTmlJNkl)|(?P<x5u>NE5YVWlPaU)|(?P<zip>NmFYQWlPaU))[a-zA-Z0-9\/\\_+\-\r\n]{40,}={0,2}'''
|
|
2439
|
+
entropy = 2
|
|
2440
|
+
keywords = ["zxlk"]
|
|
2441
|
+
|
|
2442
|
+
[[rules]]
|
|
2443
|
+
id = "kraken-access-token"
|
|
2444
|
+
description = "Identified a Kraken Access Token, potentially compromising cryptocurrency trading accounts and financial security."
|
|
2445
|
+
regex = '''(?i)[\w.-]{0,50}?(?:kraken)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9\/=_\+\-]{80,90})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2446
|
+
keywords = ["kraken"]
|
|
2447
|
+
|
|
2448
|
+
[[rules]]
|
|
2449
|
+
id = "kubernetes-secret-yaml"
|
|
2450
|
+
description = "Possible Kubernetes Secret detected, posing a risk of leaking credentials/tokens from your deployments"
|
|
2451
|
+
regex = '''(?i)(?:\bkind:[ \t]*["']?\bsecret\b["']?(?s:.){0,200}?\bdata:(?s:.){0,100}?\s+([\w.-]+:(?:[ \t]*(?:\||>[-+]?)\s+)?[ \t]*(?:["']?[a-z0-9+/]{10,}={0,3}["']?|\{\{[ \t\w"|$:=,.-]+}}|""|''))|\bdata:(?s:.){0,100}?\s+([\w.-]+:(?:[ \t]*(?:\||>[-+]?)\s+)?[ \t]*(?:["']?[a-z0-9+/]{10,}={0,3}["']?|\{\{[ \t\w"|$:=,.-]+}}|""|''))(?s:.){0,200}?\bkind:[ \t]*["']?\bsecret\b["']?)'''
|
|
2452
|
+
path = '''(?i)\.ya?ml$'''
|
|
2453
|
+
keywords = ["secret"]
|
|
2454
|
+
[[rules.allowlists]]
|
|
2455
|
+
regexes = [
|
|
2456
|
+
'''[\w.-]+:(?:[ \t]*(?:\||>[-+]?)\s+)?[ \t]*(?:\{\{[ \t\w"|$:=,.-]+}}|""|'')''',
|
|
2457
|
+
]
|
|
2458
|
+
[[rules.allowlists]]
|
|
2459
|
+
regexTarget = "match"
|
|
2460
|
+
regexes = [
|
|
2461
|
+
'''(kind:(?s:.)+\n---\n(?s:.)+\bdata:|data:(?s:.)+\n---\n(?s:.)+\bkind:)''',
|
|
2462
|
+
]
|
|
2463
|
+
|
|
2464
|
+
[[rules]]
|
|
2465
|
+
id = "kucoin-access-token"
|
|
2466
|
+
description = "Found a Kucoin Access Token, risking unauthorized access to cryptocurrency exchange services and transactions."
|
|
2467
|
+
regex = '''(?i)[\w.-]{0,50}?(?:kucoin)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{24})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2468
|
+
keywords = ["kucoin"]
|
|
2469
|
+
|
|
2470
|
+
[[rules]]
|
|
2471
|
+
id = "kucoin-secret-key"
|
|
2472
|
+
description = "Discovered a Kucoin Secret Key, which could lead to compromised cryptocurrency operations and financial data breaches."
|
|
2473
|
+
regex = '''(?i)[\w.-]{0,50}?(?:kucoin)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2474
|
+
keywords = ["kucoin"]
|
|
2475
|
+
|
|
2476
|
+
[[rules]]
|
|
2477
|
+
id = "launchdarkly-access-token"
|
|
2478
|
+
description = "Uncovered a Launchdarkly Access Token, potentially compromising feature flag management and application functionality."
|
|
2479
|
+
regex = '''(?i)[\w.-]{0,50}?(?:launchdarkly)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9=_\-]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2480
|
+
keywords = ["launchdarkly"]
|
|
2481
|
+
|
|
2482
|
+
[[rules]]
|
|
2483
|
+
id = "linear-api-key"
|
|
2484
|
+
description = "Detected a Linear API Token, posing a risk to project management tools and sensitive task data."
|
|
2485
|
+
regex = '''lin_api_(?i)[a-z0-9]{40}'''
|
|
2486
|
+
entropy = 2
|
|
2487
|
+
keywords = ["lin_api_"]
|
|
2488
|
+
|
|
2489
|
+
[[rules]]
|
|
2490
|
+
id = "linear-client-secret"
|
|
2491
|
+
description = "Identified a Linear Client Secret, which may compromise secure integrations and sensitive project management data."
|
|
2492
|
+
regex = '''(?i)[\w.-]{0,50}?(?:linear)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2493
|
+
entropy = 2
|
|
2494
|
+
keywords = ["linear"]
|
|
2495
|
+
|
|
2496
|
+
[[rules]]
|
|
2497
|
+
id = "linkedin-client-id"
|
|
2498
|
+
description = "Found a LinkedIn Client ID, risking unauthorized access to LinkedIn integrations and professional data exposure."
|
|
2499
|
+
regex = '''(?i)[\w.-]{0,50}?(?:linked[_-]?in)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{14})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2500
|
+
entropy = 2
|
|
2501
|
+
keywords = [
|
|
2502
|
+
"linkedin",
|
|
2503
|
+
"linked_in",
|
|
2504
|
+
"linked-in",
|
|
2505
|
+
]
|
|
2506
|
+
|
|
2507
|
+
[[rules]]
|
|
2508
|
+
id = "linkedin-client-secret"
|
|
2509
|
+
description = "Discovered a LinkedIn Client secret, potentially compromising LinkedIn application integrations and user data."
|
|
2510
|
+
regex = '''(?i)[\w.-]{0,50}?(?:linked[_-]?in)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{16})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2511
|
+
entropy = 2
|
|
2512
|
+
keywords = [
|
|
2513
|
+
"linkedin",
|
|
2514
|
+
"linked_in",
|
|
2515
|
+
"linked-in",
|
|
2516
|
+
]
|
|
2517
|
+
|
|
2518
|
+
[[rules]]
|
|
2519
|
+
id = "lob-api-key"
|
|
2520
|
+
description = "Uncovered a Lob API Key, which could lead to unauthorized access to mailing and address verification services."
|
|
2521
|
+
regex = '''(?i)[\w.-]{0,50}?(?:lob)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}((live|test)_[a-f0-9]{35})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2522
|
+
keywords = [
|
|
2523
|
+
"test_",
|
|
2524
|
+
"live_",
|
|
2525
|
+
]
|
|
2526
|
+
|
|
2527
|
+
[[rules]]
|
|
2528
|
+
id = "lob-pub-api-key"
|
|
2529
|
+
description = "Detected a Lob Publishable API Key, posing a risk of exposing mail and print service integrations."
|
|
2530
|
+
regex = '''(?i)[\w.-]{0,50}?(?:lob)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}((test|live)_pub_[a-f0-9]{31})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2531
|
+
keywords = [
|
|
2532
|
+
"test_pub",
|
|
2533
|
+
"live_pub",
|
|
2534
|
+
"_pub",
|
|
2535
|
+
]
|
|
2536
|
+
|
|
2537
|
+
[[rules]]
|
|
2538
|
+
id = "looker-client-id"
|
|
2539
|
+
description = "Found a Looker Client ID, risking unauthorized access to a Looker account and exposing sensitive data."
|
|
2540
|
+
regex = '''(?i)[\w.-]{0,50}?(?:looker)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{20})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2541
|
+
keywords = ["looker"]
|
|
2542
|
+
|
|
2543
|
+
[[rules]]
|
|
2544
|
+
id = "looker-client-secret"
|
|
2545
|
+
description = "Found a Looker Client Secret, risking unauthorized access to a Looker account and exposing sensitive data."
|
|
2546
|
+
regex = '''(?i)[\w.-]{0,50}?(?:looker)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{24})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2547
|
+
keywords = ["looker"]
|
|
2548
|
+
|
|
2549
|
+
[[rules]]
|
|
2550
|
+
id = "mailchimp-api-key"
|
|
2551
|
+
description = "Identified a Mailchimp API key, potentially compromising email marketing campaigns and subscriber data."
|
|
2552
|
+
regex = '''(?i)[\w.-]{0,50}?(?:MailchimpSDK.initialize|mailchimp)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{32}-us\d\d)(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2553
|
+
keywords = ["mailchimp"]
|
|
2554
|
+
|
|
2555
|
+
[[rules]]
|
|
2556
|
+
id = "mailgun-private-api-token"
|
|
2557
|
+
description = "Found a Mailgun private API token, risking unauthorized email service operations and data breaches."
|
|
2558
|
+
regex = '''(?i)[\w.-]{0,50}?(?:mailgun)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(key-[a-f0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2559
|
+
keywords = ["mailgun"]
|
|
2560
|
+
|
|
2561
|
+
[[rules]]
|
|
2562
|
+
id = "mailgun-pub-key"
|
|
2563
|
+
description = "Discovered a Mailgun public validation key, which could expose email verification processes and associated data."
|
|
2564
|
+
regex = '''(?i)[\w.-]{0,50}?(?:mailgun)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(pubkey-[a-f0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2565
|
+
keywords = ["mailgun"]
|
|
2566
|
+
|
|
2567
|
+
[[rules]]
|
|
2568
|
+
id = "mailgun-signing-key"
|
|
2569
|
+
description = "Uncovered a Mailgun webhook signing key, potentially compromising email automation and data integrity."
|
|
2570
|
+
regex = '''(?i)[\w.-]{0,50}?(?:mailgun)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-h0-9]{32}-[a-h0-9]{8}-[a-h0-9]{8})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2571
|
+
keywords = ["mailgun"]
|
|
2572
|
+
|
|
2573
|
+
[[rules]]
|
|
2574
|
+
id = "mapbox-api-token"
|
|
2575
|
+
description = "Detected a MapBox API token, posing a risk to geospatial services and sensitive location data exposure."
|
|
2576
|
+
regex = '''(?i)[\w.-]{0,50}?(?:mapbox)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(pk\.[a-z0-9]{60}\.[a-z0-9]{22})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2577
|
+
keywords = ["mapbox"]
|
|
2578
|
+
|
|
2579
|
+
[[rules]]
|
|
2580
|
+
id = "mattermost-access-token"
|
|
2581
|
+
description = "Identified a Mattermost Access Token, which may compromise team communication channels and data privacy."
|
|
2582
|
+
regex = '''(?i)[\w.-]{0,50}?(?:mattermost)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{26})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2583
|
+
keywords = ["mattermost"]
|
|
2584
|
+
|
|
2585
|
+
[[rules]]
|
|
2586
|
+
id = "maxmind-license-key"
|
|
2587
|
+
description = "Discovered a potential MaxMind license key."
|
|
2588
|
+
regex = '''\b([A-Za-z0-9]{6}_[A-Za-z0-9]{29}_mmk)(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2589
|
+
entropy = 4
|
|
2590
|
+
keywords = ["_mmk"]
|
|
2591
|
+
|
|
2592
|
+
[[rules]]
|
|
2593
|
+
id = "messagebird-api-token"
|
|
2594
|
+
description = "Found a MessageBird API token, risking unauthorized access to communication platforms and message data."
|
|
2595
|
+
regex = '''(?i)[\w.-]{0,50}?(?:message[_-]?bird)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{25})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2596
|
+
keywords = [
|
|
2597
|
+
"messagebird",
|
|
2598
|
+
"message-bird",
|
|
2599
|
+
"message_bird",
|
|
2600
|
+
]
|
|
2601
|
+
|
|
2602
|
+
[[rules]]
|
|
2603
|
+
id = "messagebird-client-id"
|
|
2604
|
+
description = "Discovered a MessageBird client ID, potentially compromising API integrations and sensitive communication data."
|
|
2605
|
+
regex = '''(?i)[\w.-]{0,50}?(?:message[_-]?bird)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2606
|
+
keywords = [
|
|
2607
|
+
"messagebird",
|
|
2608
|
+
"message-bird",
|
|
2609
|
+
"message_bird",
|
|
2610
|
+
]
|
|
2611
|
+
|
|
2612
|
+
[[rules]]
|
|
2613
|
+
id = "microsoft-teams-webhook"
|
|
2614
|
+
description = "Uncovered a Microsoft Teams Webhook, which could lead to unauthorized access to team collaboration tools and data leaks."
|
|
2615
|
+
regex = '''https://[a-z0-9]+\.webhook\.office\.com/webhookb2/[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}@[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}/IncomingWebhook/[a-z0-9]{32}/[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}'''
|
|
2616
|
+
keywords = [
|
|
2617
|
+
"webhook.office.com",
|
|
2618
|
+
"webhookb2",
|
|
2619
|
+
"incomingwebhook",
|
|
2620
|
+
]
|
|
2621
|
+
|
|
2622
|
+
[[rules]]
|
|
2623
|
+
id = "netlify-access-token"
|
|
2624
|
+
description = "Detected a Netlify Access Token, potentially compromising web hosting services and site management."
|
|
2625
|
+
regex = '''(?i)[\w.-]{0,50}?(?:netlify)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9=_\-]{40,46})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2626
|
+
keywords = ["netlify"]
|
|
2627
|
+
|
|
2628
|
+
[[rules]]
|
|
2629
|
+
id = "new-relic-browser-api-token"
|
|
2630
|
+
description = "Identified a New Relic ingest browser API token, risking unauthorized access to application performance data and analytics."
|
|
2631
|
+
regex = '''(?i)[\w.-]{0,50}?(?:new-relic|newrelic|new_relic)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(NRJS-[a-f0-9]{19})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2632
|
+
keywords = ["nrjs-"]
|
|
2633
|
+
|
|
2634
|
+
[[rules]]
|
|
2635
|
+
id = "new-relic-insert-key"
|
|
2636
|
+
description = "Discovered a New Relic insight insert key, compromising data injection into the platform."
|
|
2637
|
+
regex = '''(?i)[\w.-]{0,50}?(?:new-relic|newrelic|new_relic)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(NRII-[a-z0-9-]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2638
|
+
keywords = ["nrii-"]
|
|
2639
|
+
|
|
2640
|
+
[[rules]]
|
|
2641
|
+
id = "new-relic-user-api-id"
|
|
2642
|
+
description = "Found a New Relic user API ID, posing a risk to application monitoring services and data integrity."
|
|
2643
|
+
regex = '''(?i)[\w.-]{0,50}?(?:new-relic|newrelic|new_relic)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2644
|
+
keywords = [
|
|
2645
|
+
"new-relic",
|
|
2646
|
+
"newrelic",
|
|
2647
|
+
"new_relic",
|
|
2648
|
+
]
|
|
2649
|
+
|
|
2650
|
+
[[rules]]
|
|
2651
|
+
id = "new-relic-user-api-key"
|
|
2652
|
+
description = "Discovered a New Relic user API Key, which could lead to compromised application insights and performance monitoring."
|
|
2653
|
+
regex = '''(?i)[\w.-]{0,50}?(?:new-relic|newrelic|new_relic)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(NRAK-[a-z0-9]{27})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2654
|
+
keywords = ["nrak"]
|
|
2655
|
+
|
|
2656
|
+
[[rules]]
|
|
2657
|
+
id = "notion-api-token"
|
|
2658
|
+
description = "Notion API token"
|
|
2659
|
+
regex = '''\b(ntn_[0-9]{11}[A-Za-z0-9]{32}[A-Za-z0-9]{3})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2660
|
+
entropy = 4
|
|
2661
|
+
keywords = ["ntn_"]
|
|
2662
|
+
|
|
2663
|
+
[[rules]]
|
|
2664
|
+
id = "npm-access-token"
|
|
2665
|
+
description = "Uncovered an npm access token, potentially compromising package management and code repository access."
|
|
2666
|
+
regex = '''(?i)\b(npm_[a-z0-9]{36})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2667
|
+
entropy = 2
|
|
2668
|
+
keywords = ["npm_"]
|
|
2669
|
+
|
|
2670
|
+
[[rules]]
|
|
2671
|
+
id = "nuget-config-password"
|
|
2672
|
+
description = "Identified a password within a Nuget config file, potentially compromising package management access."
|
|
2673
|
+
regex = '''(?i)<add key=\"(?:(?:ClearText)?Password)\"\s*value=\"(.{8,})\"\s*/>'''
|
|
2674
|
+
path = '''(?i)nuget\.config$'''
|
|
2675
|
+
entropy = 1
|
|
2676
|
+
keywords = ["<add key="]
|
|
2677
|
+
[[rules.allowlists]]
|
|
2678
|
+
regexes = [
|
|
2679
|
+
'''33f!!lloppa''',
|
|
2680
|
+
'''hal\+9ooo_da!sY''',
|
|
2681
|
+
'''^\%\S.*\%$''',
|
|
2682
|
+
]
|
|
2683
|
+
|
|
2684
|
+
[[rules]]
|
|
2685
|
+
id = "nytimes-access-token"
|
|
2686
|
+
description = "Detected a Nytimes Access Token, risking unauthorized access to New York Times APIs and content services."
|
|
2687
|
+
regex = '''(?i)[\w.-]{0,50}?(?:nytimes|new-york-times,|newyorktimes)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9=_\-]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2688
|
+
keywords = [
|
|
2689
|
+
"nytimes",
|
|
2690
|
+
"new-york-times",
|
|
2691
|
+
"newyorktimes",
|
|
2692
|
+
]
|
|
2693
|
+
|
|
2694
|
+
[[rules]]
|
|
2695
|
+
id = "octopus-deploy-api-key"
|
|
2696
|
+
description = "Discovered a potential Octopus Deploy API key, risking application deployments and operational security."
|
|
2697
|
+
regex = '''\b(API-[A-Z0-9]{26})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2698
|
+
entropy = 3
|
|
2699
|
+
keywords = ["api-"]
|
|
2700
|
+
|
|
2701
|
+
[[rules]]
|
|
2702
|
+
id = "okta-access-token"
|
|
2703
|
+
description = "Identified an Okta Access Token, which may compromise identity management services and user authentication data."
|
|
2704
|
+
regex = '''[\w.-]{0,50}?(?i:[\w.-]{0,50}?(?:(?-i:[Oo]kta|OKTA))(?:[ \t\w.-]{0,20})[\s'"]{0,3})(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(00[\w=\-]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2705
|
+
entropy = 4
|
|
2706
|
+
keywords = ["okta"]
|
|
2707
|
+
|
|
2708
|
+
[[rules]]
|
|
2709
|
+
id = "openai-api-key"
|
|
2710
|
+
description = "Found an OpenAI API Key, posing a risk of unauthorized access to AI services and data manipulation."
|
|
2711
|
+
regex = '''\b(sk-(?:proj|svcacct|admin)-(?:[A-Za-z0-9_-]{74}|[A-Za-z0-9_-]{58})T3BlbkFJ(?:[A-Za-z0-9_-]{74}|[A-Za-z0-9_-]{58})\b|sk-[a-zA-Z0-9]{20}T3BlbkFJ[a-zA-Z0-9]{20})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2712
|
+
entropy = 3
|
|
2713
|
+
keywords = ["t3blbkfj"]
|
|
2714
|
+
|
|
2715
|
+
[[rules]]
|
|
2716
|
+
id = "openshift-user-token"
|
|
2717
|
+
description = "Found an OpenShift user token, potentially compromising an OpenShift/Kubernetes cluster."
|
|
2718
|
+
regex = '''\b(sha256~[\w-]{43})(?:[^\w-]|\z)'''
|
|
2719
|
+
entropy = 3.5
|
|
2720
|
+
keywords = ["sha256~"]
|
|
2721
|
+
|
|
2722
|
+
[[rules]]
|
|
2723
|
+
id = "perplexity-api-key"
|
|
2724
|
+
description = "Detected a Perplexity API key, which could lead to unauthorized access to Perplexity AI services and data exposure."
|
|
2725
|
+
regex = '''\b(pplx-[a-zA-Z0-9]{48})(?:[\x60'"\s;]|\\[nr]|$|\b)'''
|
|
2726
|
+
entropy = 4
|
|
2727
|
+
keywords = ["pplx-"]
|
|
2728
|
+
|
|
2729
|
+
[[rules]]
|
|
2730
|
+
id = "pkcs12-file"
|
|
2731
|
+
description = "Found a PKCS #12 file, which commonly contain bundled private keys."
|
|
2732
|
+
path = '''(?i)(?:^|\/)[^\/]+\.p(?:12|fx)$'''
|
|
2733
|
+
|
|
2734
|
+
[[rules]]
|
|
2735
|
+
id = "plaid-api-token"
|
|
2736
|
+
description = "Discovered a Plaid API Token, potentially compromising financial data aggregation and banking services."
|
|
2737
|
+
regex = '''(?i)[\w.-]{0,50}?(?:plaid)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(access-(?:sandbox|development|production)-[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2738
|
+
keywords = ["plaid"]
|
|
2739
|
+
|
|
2740
|
+
[[rules]]
|
|
2741
|
+
id = "plaid-client-id"
|
|
2742
|
+
description = "Uncovered a Plaid Client ID, which could lead to unauthorized financial service integrations and data breaches."
|
|
2743
|
+
regex = '''(?i)[\w.-]{0,50}?(?:plaid)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{24})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2744
|
+
entropy = 3.5
|
|
2745
|
+
keywords = ["plaid"]
|
|
2746
|
+
|
|
2747
|
+
[[rules]]
|
|
2748
|
+
id = "plaid-secret-key"
|
|
2749
|
+
description = "Detected a Plaid Secret key, risking unauthorized access to financial accounts and sensitive transaction data."
|
|
2750
|
+
regex = '''(?i)[\w.-]{0,50}?(?:plaid)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{30})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2751
|
+
entropy = 3.5
|
|
2752
|
+
keywords = ["plaid"]
|
|
2753
|
+
|
|
2754
|
+
[[rules]]
|
|
2755
|
+
id = "planetscale-api-token"
|
|
2756
|
+
description = "Identified a PlanetScale API token, potentially compromising database management and operations."
|
|
2757
|
+
regex = '''\b(pscale_tkn_(?i)[\w=\.-]{32,64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2758
|
+
entropy = 3
|
|
2759
|
+
keywords = ["pscale_tkn_"]
|
|
2760
|
+
|
|
2761
|
+
[[rules]]
|
|
2762
|
+
id = "planetscale-oauth-token"
|
|
2763
|
+
description = "Found a PlanetScale OAuth token, posing a risk to database access control and sensitive data integrity."
|
|
2764
|
+
regex = '''\b(pscale_oauth_[\w=\.-]{32,64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2765
|
+
entropy = 3
|
|
2766
|
+
keywords = ["pscale_oauth_"]
|
|
2767
|
+
|
|
2768
|
+
[[rules]]
|
|
2769
|
+
id = "planetscale-password"
|
|
2770
|
+
description = "Discovered a PlanetScale password, which could lead to unauthorized database operations and data breaches."
|
|
2771
|
+
regex = '''(?i)\b(pscale_pw_(?i)[\w=\.-]{32,64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2772
|
+
entropy = 3
|
|
2773
|
+
keywords = ["pscale_pw_"]
|
|
2774
|
+
|
|
2775
|
+
[[rules]]
|
|
2776
|
+
id = "postman-api-token"
|
|
2777
|
+
description = "Uncovered a Postman API token, potentially compromising API testing and development workflows."
|
|
2778
|
+
regex = '''\b(PMAK-(?i)[a-f0-9]{24}\-[a-f0-9]{34})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2779
|
+
entropy = 3
|
|
2780
|
+
keywords = ["pmak-"]
|
|
2781
|
+
|
|
2782
|
+
[[rules]]
|
|
2783
|
+
id = "prefect-api-token"
|
|
2784
|
+
description = "Detected a Prefect API token, risking unauthorized access to workflow management and automation services."
|
|
2785
|
+
regex = '''\b(pnu_[a-zA-Z0-9]{36})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2786
|
+
entropy = 2
|
|
2787
|
+
keywords = ["pnu_"]
|
|
2788
|
+
|
|
2789
|
+
[[rules]]
|
|
2790
|
+
id = "private-key"
|
|
2791
|
+
description = "Identified a Private Key, which may compromise cryptographic security and sensitive data encryption."
|
|
2792
|
+
regex = '''(?i)-----BEGIN[ A-Z0-9_-]{0,100}PRIVATE KEY(?: BLOCK)?-----[\s\S-]{64,}?KEY(?: BLOCK)?-----'''
|
|
2793
|
+
keywords = ["-----begin"]
|
|
2794
|
+
|
|
2795
|
+
[[rules]]
|
|
2796
|
+
id = "privateai-api-token"
|
|
2797
|
+
description = "Identified a PrivateAI Token, posing a risk of unauthorized access to AI services and data manipulation."
|
|
2798
|
+
regex = '''[\w.-]{0,50}?(?i:[\w.-]{0,50}?(?:private[_-]?ai)(?:[ \t\w.-]{0,20})[\s'"]{0,3})(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{32})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2799
|
+
entropy = 3
|
|
2800
|
+
keywords = [
|
|
2801
|
+
"privateai",
|
|
2802
|
+
"private_ai",
|
|
2803
|
+
"private-ai",
|
|
2804
|
+
]
|
|
2805
|
+
|
|
2806
|
+
[[rules]]
|
|
2807
|
+
id = "pulumi-api-token"
|
|
2808
|
+
description = "Found a Pulumi API token, posing a risk to infrastructure as code services and cloud resource management."
|
|
2809
|
+
regex = '''\b(pul-[a-f0-9]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2810
|
+
entropy = 2
|
|
2811
|
+
keywords = ["pul-"]
|
|
2812
|
+
|
|
2813
|
+
[[rules]]
|
|
2814
|
+
id = "pypi-upload-token"
|
|
2815
|
+
description = "Discovered a PyPI upload token, potentially compromising Python package distribution and repository integrity."
|
|
2816
|
+
regex = '''pypi-AgEIcHlwaS5vcmc[\w-]{50,1000}'''
|
|
2817
|
+
entropy = 3
|
|
2818
|
+
keywords = ["pypi-ageichlwas5vcmc"]
|
|
2819
|
+
|
|
2820
|
+
[[rules]]
|
|
2821
|
+
id = "rapidapi-access-token"
|
|
2822
|
+
description = "Uncovered a RapidAPI Access Token, which could lead to unauthorized access to various APIs and data services."
|
|
2823
|
+
regex = '''(?i)[\w.-]{0,50}?(?:rapidapi)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9_-]{50})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2824
|
+
keywords = ["rapidapi"]
|
|
2825
|
+
|
|
2826
|
+
[[rules]]
|
|
2827
|
+
id = "readme-api-token"
|
|
2828
|
+
description = "Detected a Readme API token, risking unauthorized documentation management and content exposure."
|
|
2829
|
+
regex = '''\b(rdme_[a-z0-9]{70})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2830
|
+
entropy = 2
|
|
2831
|
+
keywords = ["rdme_"]
|
|
2832
|
+
|
|
2833
|
+
[[rules]]
|
|
2834
|
+
id = "rubygems-api-token"
|
|
2835
|
+
description = "Identified a Rubygem API token, potentially compromising Ruby library distribution and package management."
|
|
2836
|
+
regex = '''\b(rubygems_[a-f0-9]{48})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2837
|
+
entropy = 2
|
|
2838
|
+
keywords = ["rubygems_"]
|
|
2839
|
+
|
|
2840
|
+
[[rules]]
|
|
2841
|
+
id = "scalingo-api-token"
|
|
2842
|
+
description = "Found a Scalingo API token, posing a risk to cloud platform services and application deployment security."
|
|
2843
|
+
regex = '''\b(tk-us-[\w-]{48})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2844
|
+
entropy = 2
|
|
2845
|
+
keywords = ["tk-us-"]
|
|
2846
|
+
|
|
2847
|
+
[[rules]]
|
|
2848
|
+
id = "sendbird-access-id"
|
|
2849
|
+
description = "Discovered a Sendbird Access ID, which could compromise chat and messaging platform integrations."
|
|
2850
|
+
regex = '''(?i)[\w.-]{0,50}?(?:sendbird)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2851
|
+
keywords = ["sendbird"]
|
|
2852
|
+
|
|
2853
|
+
[[rules]]
|
|
2854
|
+
id = "sendbird-access-token"
|
|
2855
|
+
description = "Uncovered a Sendbird Access Token, potentially risking unauthorized access to communication services and user data."
|
|
2856
|
+
regex = '''(?i)[\w.-]{0,50}?(?:sendbird)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2857
|
+
keywords = ["sendbird"]
|
|
2858
|
+
|
|
2859
|
+
[[rules]]
|
|
2860
|
+
id = "sendgrid-api-token"
|
|
2861
|
+
description = "Detected a SendGrid API token, posing a risk of unauthorized email service operations and data exposure."
|
|
2862
|
+
regex = '''\b(SG\.(?i)[a-z0-9=_\-\.]{66})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2863
|
+
entropy = 2
|
|
2864
|
+
keywords = ["sg."]
|
|
2865
|
+
|
|
2866
|
+
[[rules]]
|
|
2867
|
+
id = "sendinblue-api-token"
|
|
2868
|
+
description = "Identified a Sendinblue API token, which may compromise email marketing services and subscriber data privacy."
|
|
2869
|
+
regex = '''\b(xkeysib-[a-f0-9]{64}\-(?i)[a-z0-9]{16})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2870
|
+
entropy = 2
|
|
2871
|
+
keywords = ["xkeysib-"]
|
|
2872
|
+
|
|
2873
|
+
[[rules]]
|
|
2874
|
+
id = "sentry-access-token"
|
|
2875
|
+
description = "Found a Sentry.io Access Token (old format), risking unauthorized access to error tracking services and sensitive application data."
|
|
2876
|
+
regex = '''(?i)[\w.-]{0,50}?(?:sentry)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2877
|
+
entropy = 3
|
|
2878
|
+
keywords = ["sentry"]
|
|
2879
|
+
|
|
2880
|
+
[[rules]]
|
|
2881
|
+
id = "sentry-org-token"
|
|
2882
|
+
description = "Found a Sentry.io Organization Token, risking unauthorized access to error tracking services and sensitive application data."
|
|
2883
|
+
regex = '''\bsntrys_eyJpYXQiO[a-zA-Z0-9+/]{10,200}(?:LCJyZWdpb25fdXJs|InJlZ2lvbl91cmwi|cmVnaW9uX3VybCI6)[a-zA-Z0-9+/]{10,200}={0,2}_[a-zA-Z0-9+/]{43}(?:[^a-zA-Z0-9+/]|\z)'''
|
|
2884
|
+
entropy = 4.5
|
|
2885
|
+
keywords = ["sntrys_eyjpyxqio"]
|
|
2886
|
+
|
|
2887
|
+
[[rules]]
|
|
2888
|
+
id = "sentry-user-token"
|
|
2889
|
+
description = "Found a Sentry.io User Token, risking unauthorized access to error tracking services and sensitive application data."
|
|
2890
|
+
regex = '''\b(sntryu_[a-f0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2891
|
+
entropy = 3.5
|
|
2892
|
+
keywords = ["sntryu_"]
|
|
2893
|
+
|
|
2894
|
+
[[rules]]
|
|
2895
|
+
id = "settlemint-application-access-token"
|
|
2896
|
+
description = "Found a Settlemint Application Access Token."
|
|
2897
|
+
regex = '''\b(sm_aat_[a-zA-Z0-9]{16})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2898
|
+
entropy = 3
|
|
2899
|
+
keywords = ["sm_aat"]
|
|
2900
|
+
|
|
2901
|
+
[[rules]]
|
|
2902
|
+
id = "settlemint-personal-access-token"
|
|
2903
|
+
description = "Found a Settlemint Personal Access Token."
|
|
2904
|
+
regex = '''\b(sm_pat_[a-zA-Z0-9]{16})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2905
|
+
entropy = 3
|
|
2906
|
+
keywords = ["sm_pat"]
|
|
2907
|
+
|
|
2908
|
+
[[rules]]
|
|
2909
|
+
id = "settlemint-service-access-token"
|
|
2910
|
+
description = "Found a Settlemint Service Access Token."
|
|
2911
|
+
regex = '''\b(sm_sat_[a-zA-Z0-9]{16})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2912
|
+
entropy = 3
|
|
2913
|
+
keywords = ["sm_sat"]
|
|
2914
|
+
|
|
2915
|
+
[[rules]]
|
|
2916
|
+
id = "shippo-api-token"
|
|
2917
|
+
description = "Discovered a Shippo API token, potentially compromising shipping services and customer order data."
|
|
2918
|
+
regex = '''\b(shippo_(?:live|test)_[a-fA-F0-9]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2919
|
+
entropy = 2
|
|
2920
|
+
keywords = ["shippo_"]
|
|
2921
|
+
|
|
2922
|
+
[[rules]]
|
|
2923
|
+
id = "shopify-access-token"
|
|
2924
|
+
description = "Uncovered a Shopify access token, which could lead to unauthorized e-commerce platform access and data breaches."
|
|
2925
|
+
regex = '''shpat_[a-fA-F0-9]{32}'''
|
|
2926
|
+
entropy = 2
|
|
2927
|
+
keywords = ["shpat_"]
|
|
2928
|
+
|
|
2929
|
+
[[rules]]
|
|
2930
|
+
id = "shopify-custom-access-token"
|
|
2931
|
+
description = "Detected a Shopify custom access token, potentially compromising custom app integrations and e-commerce data security."
|
|
2932
|
+
regex = '''shpca_[a-fA-F0-9]{32}'''
|
|
2933
|
+
entropy = 2
|
|
2934
|
+
keywords = ["shpca_"]
|
|
2935
|
+
|
|
2936
|
+
[[rules]]
|
|
2937
|
+
id = "shopify-private-app-access-token"
|
|
2938
|
+
description = "Identified a Shopify private app access token, risking unauthorized access to private app data and store operations."
|
|
2939
|
+
regex = '''shppa_[a-fA-F0-9]{32}'''
|
|
2940
|
+
entropy = 2
|
|
2941
|
+
keywords = ["shppa_"]
|
|
2942
|
+
|
|
2943
|
+
[[rules]]
|
|
2944
|
+
id = "shopify-shared-secret"
|
|
2945
|
+
description = "Found a Shopify shared secret, posing a risk to application authentication and e-commerce platform security."
|
|
2946
|
+
regex = '''shpss_[a-fA-F0-9]{32}'''
|
|
2947
|
+
entropy = 2
|
|
2948
|
+
keywords = ["shpss_"]
|
|
2949
|
+
|
|
2950
|
+
[[rules]]
|
|
2951
|
+
id = "sidekiq-secret"
|
|
2952
|
+
description = "Discovered a Sidekiq Secret, which could lead to compromised background job processing and application data breaches."
|
|
2953
|
+
regex = '''(?i)[\w.-]{0,50}?(?:BUNDLE_ENTERPRISE__CONTRIBSYS__COM|BUNDLE_GEMS__CONTRIBSYS__COM)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-f0-9]{8}:[a-f0-9]{8})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
2954
|
+
keywords = [
|
|
2955
|
+
"bundle_enterprise__contribsys__com",
|
|
2956
|
+
"bundle_gems__contribsys__com",
|
|
2957
|
+
]
|
|
2958
|
+
|
|
2959
|
+
[[rules]]
|
|
2960
|
+
id = "sidekiq-sensitive-url"
|
|
2961
|
+
description = "Uncovered a Sidekiq Sensitive URL, potentially exposing internal job queues and sensitive operation details."
|
|
2962
|
+
regex = '''(?i)\bhttps?://([a-f0-9]{8}:[a-f0-9]{8})@(?:gems.contribsys.com|enterprise.contribsys.com)(?:[\/|\#|\?|:]|$)'''
|
|
2963
|
+
keywords = [
|
|
2964
|
+
"gems.contribsys.com",
|
|
2965
|
+
"enterprise.contribsys.com",
|
|
2966
|
+
]
|
|
2967
|
+
|
|
2968
|
+
[[rules]]
|
|
2969
|
+
id = "slack-app-token"
|
|
2970
|
+
description = "Detected a Slack App-level token, risking unauthorized access to Slack applications and workspace data."
|
|
2971
|
+
regex = '''(?i)xapp-\d-[A-Z0-9]+-\d+-[a-z0-9]+'''
|
|
2972
|
+
entropy = 2
|
|
2973
|
+
keywords = ["xapp"]
|
|
2974
|
+
|
|
2975
|
+
[[rules]]
|
|
2976
|
+
id = "slack-bot-token"
|
|
2977
|
+
description = "Identified a Slack Bot token, which may compromise bot integrations and communication channel security."
|
|
2978
|
+
regex = '''xoxb-[0-9]{10,13}-[0-9]{10,13}[a-zA-Z0-9-]*'''
|
|
2979
|
+
entropy = 3
|
|
2980
|
+
keywords = ["xoxb"]
|
|
2981
|
+
|
|
2982
|
+
[[rules]]
|
|
2983
|
+
id = "slack-config-access-token"
|
|
2984
|
+
description = "Found a Slack Configuration access token, posing a risk to workspace configuration and sensitive data access."
|
|
2985
|
+
regex = '''(?i)xoxe.xox[bp]-\d-[A-Z0-9]{163,166}'''
|
|
2986
|
+
entropy = 2
|
|
2987
|
+
keywords = [
|
|
2988
|
+
"xoxe.xoxb-",
|
|
2989
|
+
"xoxe.xoxp-",
|
|
2990
|
+
]
|
|
2991
|
+
|
|
2992
|
+
[[rules]]
|
|
2993
|
+
id = "slack-config-refresh-token"
|
|
2994
|
+
description = "Discovered a Slack Configuration refresh token, potentially allowing prolonged unauthorized access to configuration settings."
|
|
2995
|
+
regex = '''(?i)xoxe-\d-[A-Z0-9]{146}'''
|
|
2996
|
+
entropy = 2
|
|
2997
|
+
keywords = ["xoxe-"]
|
|
2998
|
+
|
|
2999
|
+
[[rules]]
|
|
3000
|
+
id = "slack-legacy-bot-token"
|
|
3001
|
+
description = "Uncovered a Slack Legacy bot token, which could lead to compromised legacy bot operations and data exposure."
|
|
3002
|
+
regex = '''xoxb-[0-9]{8,14}-[a-zA-Z0-9]{18,26}'''
|
|
3003
|
+
entropy = 2
|
|
3004
|
+
keywords = ["xoxb"]
|
|
3005
|
+
|
|
3006
|
+
[[rules]]
|
|
3007
|
+
id = "slack-legacy-token"
|
|
3008
|
+
description = "Detected a Slack Legacy token, risking unauthorized access to older Slack integrations and user data."
|
|
3009
|
+
regex = '''xox[os]-\d+-\d+-\d+-[a-fA-F\d]+'''
|
|
3010
|
+
entropy = 2
|
|
3011
|
+
keywords = [
|
|
3012
|
+
"xoxo",
|
|
3013
|
+
"xoxs",
|
|
3014
|
+
]
|
|
3015
|
+
|
|
3016
|
+
[[rules]]
|
|
3017
|
+
id = "slack-legacy-workspace-token"
|
|
3018
|
+
description = "Identified a Slack Legacy Workspace token, potentially compromising access to workspace data and legacy features."
|
|
3019
|
+
regex = '''xox[ar]-(?:\d-)?[0-9a-zA-Z]{8,48}'''
|
|
3020
|
+
entropy = 2
|
|
3021
|
+
keywords = [
|
|
3022
|
+
"xoxa",
|
|
3023
|
+
"xoxr",
|
|
3024
|
+
]
|
|
3025
|
+
|
|
3026
|
+
[[rules]]
|
|
3027
|
+
id = "slack-user-token"
|
|
3028
|
+
description = "Found a Slack User token, posing a risk of unauthorized user impersonation and data access within Slack workspaces."
|
|
3029
|
+
regex = '''xox[pe](?:-[0-9]{10,13}){3}-[a-zA-Z0-9-]{28,34}'''
|
|
3030
|
+
entropy = 2
|
|
3031
|
+
keywords = [
|
|
3032
|
+
"xoxp-",
|
|
3033
|
+
"xoxe-",
|
|
3034
|
+
]
|
|
3035
|
+
|
|
3036
|
+
[[rules]]
|
|
3037
|
+
id = "slack-webhook-url"
|
|
3038
|
+
description = "Discovered a Slack Webhook, which could lead to unauthorized message posting and data leakage in Slack channels."
|
|
3039
|
+
regex = '''(?:https?://)?hooks.slack.com/(?:services|workflows|triggers)/[A-Za-z0-9+/]{43,56}'''
|
|
3040
|
+
keywords = ["hooks.slack.com"]
|
|
3041
|
+
|
|
3042
|
+
[[rules]]
|
|
3043
|
+
id = "snyk-api-token"
|
|
3044
|
+
description = "Uncovered a Snyk API token, potentially compromising software vulnerability scanning and code security."
|
|
3045
|
+
regex = '''(?i)[\w.-]{0,50}?(?:snyk[_.-]?(?:(?:api|oauth)[_.-]?)?(?:key|token))(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3046
|
+
keywords = ["snyk"]
|
|
3047
|
+
|
|
3048
|
+
[[rules]]
|
|
3049
|
+
id = "sonar-api-token"
|
|
3050
|
+
description = "Uncovered a Sonar API token, potentially compromising software vulnerability scanning and code security."
|
|
3051
|
+
regex = '''(?i)[\w.-]{0,50}?(?:sonar[_.-]?(login|token))(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}((?:squ_|sqp_|sqa_)?[a-z0-9=_\-]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3052
|
+
secretGroup = 2
|
|
3053
|
+
keywords = ["sonar"]
|
|
3054
|
+
|
|
3055
|
+
[[rules]]
|
|
3056
|
+
id = "sourcegraph-access-token"
|
|
3057
|
+
description = "Sourcegraph is a code search and navigation engine."
|
|
3058
|
+
regex = '''(?i)\b(\b(sgp_(?:[a-fA-F0-9]{16}|local)_[a-fA-F0-9]{40}|sgp_[a-fA-F0-9]{40}|[a-fA-F0-9]{40})\b)(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3059
|
+
entropy = 3
|
|
3060
|
+
keywords = [
|
|
3061
|
+
"sgp_",
|
|
3062
|
+
"sourcegraph",
|
|
3063
|
+
]
|
|
3064
|
+
|
|
3065
|
+
[[rules]]
|
|
3066
|
+
id = "square-access-token"
|
|
3067
|
+
description = "Detected a Square Access Token, risking unauthorized payment processing and financial transaction exposure."
|
|
3068
|
+
regex = '''\b((?:EAAA|sq0atp-)[\w-]{22,60})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3069
|
+
entropy = 2
|
|
3070
|
+
keywords = [
|
|
3071
|
+
"sq0atp-",
|
|
3072
|
+
"eaaa",
|
|
3073
|
+
]
|
|
3074
|
+
|
|
3075
|
+
[[rules]]
|
|
3076
|
+
id = "squarespace-access-token"
|
|
3077
|
+
description = "Identified a Squarespace Access Token, which may compromise website management and content control on Squarespace."
|
|
3078
|
+
regex = '''(?i)[\w.-]{0,50}?(?:squarespace)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3079
|
+
keywords = ["squarespace"]
|
|
3080
|
+
|
|
3081
|
+
[[rules]]
|
|
3082
|
+
id = "stripe-access-token"
|
|
3083
|
+
description = "Found a Stripe Access Token, posing a risk to payment processing services and sensitive financial data."
|
|
3084
|
+
regex = '''\b((?:sk|rk)_(?:test|live|prod)_[a-zA-Z0-9]{10,99})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3085
|
+
entropy = 2
|
|
3086
|
+
keywords = [
|
|
3087
|
+
"sk_test",
|
|
3088
|
+
"sk_live",
|
|
3089
|
+
"sk_prod",
|
|
3090
|
+
"rk_test",
|
|
3091
|
+
"rk_live",
|
|
3092
|
+
"rk_prod",
|
|
3093
|
+
]
|
|
3094
|
+
|
|
3095
|
+
[[rules]]
|
|
3096
|
+
id = "sumologic-access-id"
|
|
3097
|
+
description = "Discovered a SumoLogic Access ID, potentially compromising log management services and data analytics integrity."
|
|
3098
|
+
regex = '''[\w.-]{0,50}?(?i:[\w.-]{0,50}?(?:(?-i:[Ss]umo|SUMO))(?:[ \t\w.-]{0,20})[\s'"]{0,3})(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(su[a-zA-Z0-9]{12})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3099
|
+
entropy = 3
|
|
3100
|
+
keywords = ["sumo"]
|
|
3101
|
+
|
|
3102
|
+
[[rules]]
|
|
3103
|
+
id = "sumologic-access-token"
|
|
3104
|
+
description = "Uncovered a SumoLogic Access Token, which could lead to unauthorized access to log data and analytics insights."
|
|
3105
|
+
regex = '''(?i)[\w.-]{0,50}?(?:(?-i:[Ss]umo|SUMO))(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{64})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3106
|
+
entropy = 3
|
|
3107
|
+
keywords = ["sumo"]
|
|
3108
|
+
|
|
3109
|
+
[[rules]]
|
|
3110
|
+
id = "telegram-bot-api-token"
|
|
3111
|
+
description = "Detected a Telegram Bot API Token, risking unauthorized bot operations and message interception on Telegram."
|
|
3112
|
+
regex = '''(?i)[\w.-]{0,50}?(?:telegr)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9]{5,16}:(?-i:A)[a-z0-9_\-]{34})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3113
|
+
keywords = ["telegr"]
|
|
3114
|
+
|
|
3115
|
+
[[rules]]
|
|
3116
|
+
id = "travisci-access-token"
|
|
3117
|
+
description = "Identified a Travis CI Access Token, potentially compromising continuous integration services and codebase security."
|
|
3118
|
+
regex = '''(?i)[\w.-]{0,50}?(?:travis)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{22})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3119
|
+
keywords = ["travis"]
|
|
3120
|
+
|
|
3121
|
+
[[rules]]
|
|
3122
|
+
id = "twilio-api-key"
|
|
3123
|
+
description = "Found a Twilio API Key, posing a risk to communication services and sensitive customer interaction data."
|
|
3124
|
+
regex = '''SK[0-9a-fA-F]{32}'''
|
|
3125
|
+
entropy = 3
|
|
3126
|
+
keywords = ["sk"]
|
|
3127
|
+
|
|
3128
|
+
[[rules]]
|
|
3129
|
+
id = "twitch-api-token"
|
|
3130
|
+
description = "Discovered a Twitch API token, which could compromise streaming services and account integrations."
|
|
3131
|
+
regex = '''(?i)[\w.-]{0,50}?(?:twitch)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{30})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3132
|
+
keywords = ["twitch"]
|
|
3133
|
+
|
|
3134
|
+
[[rules]]
|
|
3135
|
+
id = "twitter-access-secret"
|
|
3136
|
+
description = "Uncovered a Twitter Access Secret, potentially risking unauthorized Twitter integrations and data breaches."
|
|
3137
|
+
regex = '''(?i)[\w.-]{0,50}?(?:twitter)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{45})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3138
|
+
keywords = ["twitter"]
|
|
3139
|
+
|
|
3140
|
+
[[rules]]
|
|
3141
|
+
id = "twitter-access-token"
|
|
3142
|
+
description = "Detected a Twitter Access Token, posing a risk of unauthorized account operations and social media data exposure."
|
|
3143
|
+
regex = '''(?i)[\w.-]{0,50}?(?:twitter)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([0-9]{15,25}-[a-zA-Z0-9]{20,40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3144
|
+
keywords = ["twitter"]
|
|
3145
|
+
|
|
3146
|
+
[[rules]]
|
|
3147
|
+
id = "twitter-api-key"
|
|
3148
|
+
description = "Identified a Twitter API Key, which may compromise Twitter application integrations and user data security."
|
|
3149
|
+
regex = '''(?i)[\w.-]{0,50}?(?:twitter)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{25})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3150
|
+
keywords = ["twitter"]
|
|
3151
|
+
|
|
3152
|
+
[[rules]]
|
|
3153
|
+
id = "twitter-api-secret"
|
|
3154
|
+
description = "Found a Twitter API Secret, risking the security of Twitter app integrations and sensitive data access."
|
|
3155
|
+
regex = '''(?i)[\w.-]{0,50}?(?:twitter)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{50})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3156
|
+
keywords = ["twitter"]
|
|
3157
|
+
|
|
3158
|
+
[[rules]]
|
|
3159
|
+
id = "twitter-bearer-token"
|
|
3160
|
+
description = "Discovered a Twitter Bearer Token, potentially compromising API access and data retrieval from Twitter."
|
|
3161
|
+
regex = '''(?i)[\w.-]{0,50}?(?:twitter)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(A{22}[a-zA-Z0-9%]{80,100})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3162
|
+
keywords = ["twitter"]
|
|
3163
|
+
|
|
3164
|
+
[[rules]]
|
|
3165
|
+
id = "typeform-api-token"
|
|
3166
|
+
description = "Uncovered a Typeform API token, which could lead to unauthorized survey management and data collection."
|
|
3167
|
+
regex = '''(?i)[\w.-]{0,50}?(?:typeform)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(tfp_[a-z0-9\-_\.=]{59})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3168
|
+
keywords = ["tfp_"]
|
|
3169
|
+
|
|
3170
|
+
[[rules]]
|
|
3171
|
+
id = "vault-batch-token"
|
|
3172
|
+
description = "Detected a Vault Batch Token, risking unauthorized access to secret management services and sensitive data."
|
|
3173
|
+
regex = '''\b(hvb\.[\w-]{138,300})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3174
|
+
entropy = 4
|
|
3175
|
+
keywords = ["hvb."]
|
|
3176
|
+
|
|
3177
|
+
[[rules]]
|
|
3178
|
+
id = "vault-service-token"
|
|
3179
|
+
description = "Identified a Vault Service Token, potentially compromising infrastructure security and access to sensitive credentials."
|
|
3180
|
+
regex = '''\b((?:hvs\.[\w-]{90,120}|s\.(?i:[a-z0-9]{24})))(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3181
|
+
entropy = 3.5
|
|
3182
|
+
keywords = [
|
|
3183
|
+
"hvs.",
|
|
3184
|
+
"s.",
|
|
3185
|
+
]
|
|
3186
|
+
[[rules.allowlists]]
|
|
3187
|
+
regexes = [
|
|
3188
|
+
'''s\.[A-Za-z]{24}''',
|
|
3189
|
+
]
|
|
3190
|
+
|
|
3191
|
+
[[rules]]
|
|
3192
|
+
id = "yandex-access-token"
|
|
3193
|
+
description = "Found a Yandex Access Token, posing a risk to Yandex service integrations and user data privacy."
|
|
3194
|
+
regex = '''(?i)[\w.-]{0,50}?(?:yandex)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(t1\.[A-Z0-9a-z_-]+[=]{0,2}\.[A-Z0-9a-z_-]{86}[=]{0,2})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3195
|
+
keywords = ["yandex"]
|
|
3196
|
+
|
|
3197
|
+
[[rules]]
|
|
3198
|
+
id = "yandex-api-key"
|
|
3199
|
+
description = "Discovered a Yandex API Key, which could lead to unauthorized access to Yandex services and data manipulation."
|
|
3200
|
+
regex = '''(?i)[\w.-]{0,50}?(?:yandex)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(AQVN[A-Za-z0-9_\-]{35,38})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3201
|
+
keywords = ["yandex"]
|
|
3202
|
+
|
|
3203
|
+
[[rules]]
|
|
3204
|
+
id = "yandex-aws-access-token"
|
|
3205
|
+
description = "Uncovered a Yandex AWS Access Token, potentially compromising cloud resource access and data security on Yandex Cloud."
|
|
3206
|
+
regex = '''(?i)[\w.-]{0,50}?(?:yandex)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}(YC[a-zA-Z0-9_\-]{38})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3207
|
+
keywords = ["yandex"]
|
|
3208
|
+
|
|
3209
|
+
[[rules]]
|
|
3210
|
+
id = "zendesk-secret-key"
|
|
3211
|
+
description = "Detected a Zendesk Secret Key, risking unauthorized access to customer support services and sensitive ticketing data."
|
|
3212
|
+
regex = '''(?i)[\w.-]{0,50}?(?:zendesk)(?:[ \t\w.-]{0,20})[\s'"]{0,3}(?:=|>|:{1,3}=|\|\||:|=>|\?=|,)[\x60'"\s=]{0,5}([a-z0-9]{40})(?:[\x60'"\s;]|\\[nr]|$)'''
|
|
3213
|
+
keywords = ["zendesk"]
|
|
3214
|
+
|