agent-security-scanner-mcp 3.0.0 → 3.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +451 -739
- package/analyzer.py +51 -7
- package/index.js +42 -2697
- package/package.json +7 -6
- package/regex_fallback.py +66 -0
- package/rules/__init__.py +124 -36
- package/rules/generic/secrets/gitleaks/adafruit-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/adobe-client-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/adobe-client-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/age-secret-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/airtable-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/algolia-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/alibaba-access-key-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/alibaba-secret-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/asana-client-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/asana-client-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/atlassian-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/authress-service-client-access-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/aws-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/beamer-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/bitbucket-client-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/bitbucket-client-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/bittrex-access-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/bittrex-secret-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/clojars-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/cloudflare-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/cloudflare-global-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/cloudflare-origin-ca-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/codecov-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/coinbase-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/confluent-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/confluent-secret-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/contentful-delivery-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/databricks-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/datadog-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/defined-networking-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/digitalocean-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/digitalocean-pat.yaml +27 -0
- package/rules/generic/secrets/gitleaks/digitalocean-refresh-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/discord-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/discord-client-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/discord-client-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/doppler-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/droneci-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/dropbox-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/dropbox-long-lived-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/dropbox-short-lived-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/duffel-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/dynatrace-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/easypost-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/easypost-test-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/etsy-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/facebook-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/facebook-page-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/facebook-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/facebook.yaml +27 -0
- package/rules/generic/secrets/gitleaks/fastly-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/finicity-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/finicity-client-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/finnhub-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/flickr-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/flutterwave-encryption-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/flutterwave-public-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/flutterwave-secret-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/frameio-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/freshbooks-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/gcp-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/generic-api-key.yaml +76 -0
- package/rules/generic/secrets/gitleaks/github-app-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/github-fine-grained-pat.yaml +27 -0
- package/rules/generic/secrets/gitleaks/github-oauth.yaml +27 -0
- package/rules/generic/secrets/gitleaks/github-pat.yaml +27 -0
- package/rules/generic/secrets/gitleaks/github-refresh-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/gitlab-pat.yaml +27 -0
- package/rules/generic/secrets/gitleaks/gitlab-ptt.yaml +27 -0
- package/rules/generic/secrets/gitleaks/gitlab-rrt.yaml +27 -0
- package/rules/generic/secrets/gitleaks/gitter-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/gocardless-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/grafana-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/grafana-cloud-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/grafana-service-account-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/harness-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/hashicorp-tf-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/hashicorp-tf-password.yaml +31 -0
- package/rules/generic/secrets/gitleaks/heroku-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/hubspot-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/huggingface-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/huggingface-organization-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/infracost-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/intercom-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/intra42-client-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/jfrog-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/jfrog-identity-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/jwt-base64.yaml +27 -0
- package/rules/generic/secrets/gitleaks/jwt.yaml +27 -0
- package/rules/generic/secrets/gitleaks/kraken-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/kucoin-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/kucoin-secret-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/launchdarkly-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/linear-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/linear-client-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/linkedin-client-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/linkedin-client-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/lob-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/lob-pub-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/mailchimp-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/mailgun-private-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/mailgun-pub-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/mailgun-signing-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/mapbox-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/mattermost-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/messagebird-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/messagebird-client-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/microsoft-teams-webhook.yaml +27 -0
- package/rules/generic/secrets/gitleaks/netlify-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/new-relic-browser-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/new-relic-insert-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/new-relic-user-api-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/new-relic-user-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/npm-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/nytimes-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/okta-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/openai-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/plaid-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/plaid-client-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/plaid-secret-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/planetscale-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/planetscale-oauth-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/planetscale-password.yaml +27 -0
- package/rules/generic/secrets/gitleaks/postman-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/prefect-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/private-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/pulumi-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/pypi-upload-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/rapidapi-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/readme-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/rubygems-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/scalingo-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/sendbird-access-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/sendbird-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/sendgrid-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/sendinblue-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/sentry-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/shippo-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/shopify-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/shopify-custom-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/shopify-private-app-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/shopify-shared-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/sidekiq-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/sidekiq-sensitive-url.yaml +27 -0
- package/rules/generic/secrets/gitleaks/slack-app-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/slack-bot-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/slack-config-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/slack-config-refresh-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/slack-legacy-bot-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/slack-legacy-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/slack-legacy-workspace-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/slack-user-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/slack-webhook-url.yaml +27 -0
- package/rules/generic/secrets/gitleaks/snyk-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/square-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/squarespace-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/stripe-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/sumologic-access-id.yaml +27 -0
- package/rules/generic/secrets/gitleaks/sumologic-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/telegram-bot-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/travisci-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/twilio-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/twitch-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/twitter-access-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/twitter-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/twitter-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/twitter-api-secret.yaml +27 -0
- package/rules/generic/secrets/gitleaks/twitter-bearer-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/typeform-api-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/vault-batch-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/vault-service-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/yandex-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/yandex-api-key.yaml +27 -0
- package/rules/generic/secrets/gitleaks/yandex-aws-access-token.yaml +27 -0
- package/rules/generic/secrets/gitleaks/zendesk-secret-key.yaml +27 -0
- package/rules/generic/secrets/security/detected-amazon-mws-auth-token.yaml +26 -0
- package/rules/generic/secrets/security/detected-artifactory-password.yaml +47 -0
- package/rules/generic/secrets/security/detected-artifactory-token.yaml +44 -0
- package/rules/generic/secrets/security/detected-aws-access-key-id-value.yaml +29 -0
- package/rules/generic/secrets/security/detected-aws-account-id.yaml +58 -0
- package/rules/generic/secrets/security/detected-aws-appsync-graphql-key.yaml +27 -0
- package/rules/generic/secrets/security/detected-aws-secret-access-key.yaml +30 -0
- package/rules/generic/secrets/security/detected-aws-session-token.yaml +31 -0
- package/rules/generic/secrets/security/detected-bcrypt-hash.yaml +25 -0
- package/rules/generic/secrets/security/detected-codeclimate.yaml +27 -0
- package/rules/generic/secrets/security/detected-etc-shadow.yaml +27 -0
- package/rules/generic/secrets/security/detected-facebook-access-token.yaml +29 -0
- package/rules/generic/secrets/security/detected-facebook-oauth.yaml +27 -0
- package/rules/generic/secrets/security/detected-generic-api-key.yaml +29 -0
- package/rules/generic/secrets/security/detected-generic-secret.yaml +30 -0
- package/rules/generic/secrets/security/detected-github-token.yaml +47 -0
- package/rules/generic/secrets/security/detected-google-api-key.yaml +29 -0
- package/rules/generic/secrets/security/detected-google-cloud-api-key.yaml +27 -0
- package/rules/generic/secrets/security/detected-google-gcm-service-account.yaml +27 -0
- package/rules/generic/secrets/security/detected-google-oauth-access-token.yaml +26 -0
- package/rules/generic/secrets/security/detected-google-oauth.yaml +26 -0
- package/rules/generic/secrets/security/detected-heroku-api-key.yaml +27 -0
- package/rules/generic/secrets/security/detected-hockeyapp.yaml +27 -0
- package/rules/generic/secrets/security/detected-jwt-token.yaml +25 -0
- package/rules/generic/secrets/security/detected-kolide-api-key.yaml +25 -0
- package/rules/generic/secrets/security/detected-mailchimp-api-key.yaml +26 -0
- package/rules/generic/secrets/security/detected-mailgun-api-key.yaml +26 -0
- package/rules/generic/secrets/security/detected-npm-registry-auth-token.yaml +33 -0
- package/rules/generic/secrets/security/detected-onfido-live-api-token.yaml +20 -0
- package/rules/generic/secrets/security/detected-outlook-team.yaml +27 -0
- package/rules/generic/secrets/security/detected-paypal-braintree-access-token.yaml +27 -0
- package/rules/generic/secrets/security/detected-pgp-private-key-block.yaml +28 -0
- package/rules/generic/secrets/security/detected-picatic-api-key.yaml +26 -0
- package/rules/generic/secrets/security/detected-private-key.yaml +39 -0
- package/rules/generic/secrets/security/detected-sauce-token.yaml +27 -0
- package/rules/generic/secrets/security/detected-sendgrid-api-key.yaml +27 -0
- package/rules/generic/secrets/security/detected-slack-token.yaml +28 -0
- package/rules/generic/secrets/security/detected-slack-webhook.yaml +27 -0
- package/rules/generic/secrets/security/detected-snyk-api-key.yaml +26 -0
- package/rules/generic/secrets/security/detected-softlayer-api-key.yaml +27 -0
- package/rules/generic/secrets/security/detected-sonarqube-docs-api-key.yaml +40 -0
- package/rules/generic/secrets/security/detected-square-access-token.yaml +26 -0
- package/rules/generic/secrets/security/detected-square-oauth-secret.yaml +27 -0
- package/rules/generic/secrets/security/detected-ssh-password.yaml +27 -0
- package/rules/generic/secrets/security/detected-stripe-api-key.yaml +26 -0
- package/rules/generic/secrets/security/detected-stripe-restricted-api-key.yaml +26 -0
- package/rules/generic/secrets/security/detected-telegram-bot-api-key.yaml +30 -0
- package/rules/generic/secrets/security/detected-twilio-api-key.yaml +26 -0
- package/rules/generic/secrets/security/detected-username-and-password-in-uri.yaml +35 -0
- package/rules/generic/secrets/security/google-maps-apikeyleak.yaml +25 -0
- package/rules/prompt-injection.security.yaml +4 -0
- package/rules/python/flask/security/injection/flask-injection-sinks.yaml +352 -0
- package/src/analyzer.py +119 -0
- package/src/cli/demo.js +238 -0
- package/src/cli/doctor.js +273 -0
- package/src/cli/init.js +288 -0
- package/src/fix-patterns.js +698 -0
- package/src/tools/check-package.js +169 -0
- package/src/tools/fix-security.js +115 -0
- package/src/tools/scan-packages.js +154 -0
- package/src/tools/scan-prompt.js +570 -0
- package/src/tools/scan-security.js +117 -0
- package/src/utils.js +153 -0
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: mailchimp-api-key
|
|
3
|
+
message: A gitleaks mailchimp-api-key was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:MailchimpSDK.initialize|mailchimp)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-f0-9]{32}-us\d\d)(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: mailgun-private-api-token
|
|
3
|
+
message: A gitleaks mailgun-private-api-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:mailgun)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(key-[a-f0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: mailgun-pub-key
|
|
3
|
+
message: A gitleaks mailgun-pub-key was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:mailgun)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(pubkey-[a-f0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: mailgun-signing-key
|
|
3
|
+
message: A gitleaks mailgun-signing-key was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:mailgun)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-h0-9]{32}-[a-h0-9]{8}-[a-h0-9]{8})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: mapbox-api-token
|
|
3
|
+
message: A gitleaks mapbox-api-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:mapbox)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(pk\.[a-z0-9]{60}\.[a-z0-9]{22})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: mattermost-access-token
|
|
3
|
+
message: A gitleaks mattermost-access-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:mattermost)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{26})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: messagebird-api-token
|
|
3
|
+
message: A gitleaks messagebird-api-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:messagebird|message-bird|message_bird)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{25})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: messagebird-client-id
|
|
3
|
+
message: A gitleaks messagebird-client-id was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:messagebird|message-bird|message_bird)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: microsoft-teams-webhook
|
|
3
|
+
message: A gitleaks microsoft-teams-webhook was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: https:\/\/[a-z0-9]+\.webhook\.office\.com\/webhookb2\/[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}@[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}\/IncomingWebhook\/[a-z0-9]{32}\/[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: netlify-access-token
|
|
3
|
+
message: A gitleaks netlify-access-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:netlify)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9=_\-]{40,46})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: new-relic-browser-api-token
|
|
3
|
+
message: A gitleaks new-relic-browser-api-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:new-relic|newrelic|new_relic)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(NRJS-[a-f0-9]{19})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: new-relic-insert-key
|
|
3
|
+
message: A gitleaks new-relic-insert-key was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:new-relic|newrelic|new_relic)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(NRII-[a-z0-9-]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: new-relic-user-api-id
|
|
3
|
+
message: A gitleaks new-relic-user-api-id was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:new-relic|newrelic|new_relic)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: new-relic-user-api-key
|
|
3
|
+
message: A gitleaks new-relic-user-api-key was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:new-relic|newrelic|new_relic)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(NRAK-[a-z0-9]{27})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: npm-access-token
|
|
3
|
+
message: A gitleaks npm-access-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)\b(npm_[a-z0-9]{36})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: nytimes-access-token
|
|
3
|
+
message: A gitleaks nytimes-access-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:nytimes|new-york-times,|newyorktimes)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9=_\-]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: okta-access-token
|
|
3
|
+
message: A gitleaks okta-access-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:okta)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9=_\-]{42})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: openai-api-key
|
|
3
|
+
message: A gitleaks openai-api-key was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)\b(sk-[a-zA-Z0-9]{20}T3BlbkFJ[a-zA-Z0-9]{20})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: plaid-api-token
|
|
3
|
+
message: A gitleaks plaid-api-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:plaid)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(access-(?:sandbox|development|production)-[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: plaid-client-id
|
|
3
|
+
message: A gitleaks plaid-client-id was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:plaid)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{24})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: plaid-secret-key
|
|
3
|
+
message: A gitleaks plaid-secret-key was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)(?:plaid)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{30})(?:['|\"|\n|\r|\s|\x60|;]|$)
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: planetscale-api-token
|
|
3
|
+
message: A gitleaks planetscale-api-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
|
|
4
|
+
languages:
|
|
5
|
+
- regex
|
|
6
|
+
severity: INFO
|
|
7
|
+
metadata:
|
|
8
|
+
likelihood: LOW
|
|
9
|
+
impact: MEDIUM
|
|
10
|
+
confidence: LOW
|
|
11
|
+
category: security
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-798: Use of Hard-coded Credentials"
|
|
14
|
+
cwe2021-top25: true
|
|
15
|
+
cwe2022-top25: true
|
|
16
|
+
owasp:
|
|
17
|
+
- A07:2021 - Identification and Authentication Failures
|
|
18
|
+
- A07:2025 - Authentication Failures
|
|
19
|
+
references:
|
|
20
|
+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
|
|
21
|
+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
technology:
|
|
25
|
+
- gitleaks
|
|
26
|
+
patterns:
|
|
27
|
+
- pattern-regex: (?i)\b(pscale_tkn_(?i)[a-z0-9=\-_\.]{32,64})(?:['|\"|\n|\r|\s|\x60|;]|$)
|