attune-ai 2.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- attune/__init__.py +358 -0
- attune/adaptive/__init__.py +13 -0
- attune/adaptive/task_complexity.py +127 -0
- attune/agent_monitoring.py +414 -0
- attune/cache/__init__.py +117 -0
- attune/cache/base.py +166 -0
- attune/cache/dependency_manager.py +256 -0
- attune/cache/hash_only.py +251 -0
- attune/cache/hybrid.py +457 -0
- attune/cache/storage.py +285 -0
- attune/cache_monitor.py +356 -0
- attune/cache_stats.py +298 -0
- attune/cli/__init__.py +152 -0
- attune/cli/__main__.py +12 -0
- attune/cli/commands/__init__.py +1 -0
- attune/cli/commands/batch.py +264 -0
- attune/cli/commands/cache.py +248 -0
- attune/cli/commands/help.py +331 -0
- attune/cli/commands/info.py +140 -0
- attune/cli/commands/inspect.py +436 -0
- attune/cli/commands/inspection.py +57 -0
- attune/cli/commands/memory.py +48 -0
- attune/cli/commands/metrics.py +92 -0
- attune/cli/commands/orchestrate.py +184 -0
- attune/cli/commands/patterns.py +207 -0
- attune/cli/commands/profiling.py +202 -0
- attune/cli/commands/provider.py +98 -0
- attune/cli/commands/routing.py +285 -0
- attune/cli/commands/setup.py +96 -0
- attune/cli/commands/status.py +235 -0
- attune/cli/commands/sync.py +166 -0
- attune/cli/commands/tier.py +121 -0
- attune/cli/commands/utilities.py +114 -0
- attune/cli/commands/workflow.py +579 -0
- attune/cli/core.py +32 -0
- attune/cli/parsers/__init__.py +68 -0
- attune/cli/parsers/batch.py +118 -0
- attune/cli/parsers/cache.py +65 -0
- attune/cli/parsers/help.py +41 -0
- attune/cli/parsers/info.py +26 -0
- attune/cli/parsers/inspect.py +66 -0
- attune/cli/parsers/metrics.py +42 -0
- attune/cli/parsers/orchestrate.py +61 -0
- attune/cli/parsers/patterns.py +54 -0
- attune/cli/parsers/provider.py +40 -0
- attune/cli/parsers/routing.py +110 -0
- attune/cli/parsers/setup.py +42 -0
- attune/cli/parsers/status.py +47 -0
- attune/cli/parsers/sync.py +31 -0
- attune/cli/parsers/tier.py +33 -0
- attune/cli/parsers/workflow.py +77 -0
- attune/cli/utils/__init__.py +1 -0
- attune/cli/utils/data.py +242 -0
- attune/cli/utils/helpers.py +68 -0
- attune/cli_legacy.py +3957 -0
- attune/cli_minimal.py +1159 -0
- attune/cli_router.py +437 -0
- attune/cli_unified.py +814 -0
- attune/config/__init__.py +66 -0
- attune/config/xml_config.py +286 -0
- attune/config.py +545 -0
- attune/coordination.py +870 -0
- attune/core.py +1511 -0
- attune/core_modules/__init__.py +15 -0
- attune/cost_tracker.py +626 -0
- attune/dashboard/__init__.py +41 -0
- attune/dashboard/app.py +512 -0
- attune/dashboard/simple_server.py +435 -0
- attune/dashboard/standalone_server.py +547 -0
- attune/discovery.py +306 -0
- attune/emergence.py +306 -0
- attune/exceptions.py +123 -0
- attune/feedback_loops.py +373 -0
- attune/hot_reload/README.md +473 -0
- attune/hot_reload/__init__.py +62 -0
- attune/hot_reload/config.py +83 -0
- attune/hot_reload/integration.py +229 -0
- attune/hot_reload/reloader.py +298 -0
- attune/hot_reload/watcher.py +183 -0
- attune/hot_reload/websocket.py +177 -0
- attune/levels.py +577 -0
- attune/leverage_points.py +441 -0
- attune/logging_config.py +261 -0
- attune/mcp/__init__.py +10 -0
- attune/mcp/server.py +506 -0
- attune/memory/__init__.py +237 -0
- attune/memory/claude_memory.py +469 -0
- attune/memory/config.py +224 -0
- attune/memory/control_panel.py +1290 -0
- attune/memory/control_panel_support.py +145 -0
- attune/memory/cross_session.py +845 -0
- attune/memory/edges.py +179 -0
- attune/memory/encryption.py +159 -0
- attune/memory/file_session.py +770 -0
- attune/memory/graph.py +570 -0
- attune/memory/long_term.py +913 -0
- attune/memory/long_term_types.py +99 -0
- attune/memory/mixins/__init__.py +25 -0
- attune/memory/mixins/backend_init_mixin.py +249 -0
- attune/memory/mixins/capabilities_mixin.py +208 -0
- attune/memory/mixins/handoff_mixin.py +208 -0
- attune/memory/mixins/lifecycle_mixin.py +49 -0
- attune/memory/mixins/long_term_mixin.py +352 -0
- attune/memory/mixins/promotion_mixin.py +109 -0
- attune/memory/mixins/short_term_mixin.py +182 -0
- attune/memory/nodes.py +179 -0
- attune/memory/redis_bootstrap.py +540 -0
- attune/memory/security/__init__.py +31 -0
- attune/memory/security/audit_logger.py +932 -0
- attune/memory/security/pii_scrubber.py +640 -0
- attune/memory/security/secrets_detector.py +678 -0
- attune/memory/short_term.py +2192 -0
- attune/memory/simple_storage.py +302 -0
- attune/memory/storage/__init__.py +15 -0
- attune/memory/storage_backend.py +167 -0
- attune/memory/summary_index.py +583 -0
- attune/memory/types.py +446 -0
- attune/memory/unified.py +182 -0
- attune/meta_workflows/__init__.py +74 -0
- attune/meta_workflows/agent_creator.py +248 -0
- attune/meta_workflows/builtin_templates.py +567 -0
- attune/meta_workflows/cli_commands/__init__.py +56 -0
- attune/meta_workflows/cli_commands/agent_commands.py +321 -0
- attune/meta_workflows/cli_commands/analytics_commands.py +442 -0
- attune/meta_workflows/cli_commands/config_commands.py +232 -0
- attune/meta_workflows/cli_commands/memory_commands.py +182 -0
- attune/meta_workflows/cli_commands/template_commands.py +354 -0
- attune/meta_workflows/cli_commands/workflow_commands.py +382 -0
- attune/meta_workflows/cli_meta_workflows.py +59 -0
- attune/meta_workflows/form_engine.py +292 -0
- attune/meta_workflows/intent_detector.py +409 -0
- attune/meta_workflows/models.py +569 -0
- attune/meta_workflows/pattern_learner.py +738 -0
- attune/meta_workflows/plan_generator.py +384 -0
- attune/meta_workflows/session_context.py +397 -0
- attune/meta_workflows/template_registry.py +229 -0
- attune/meta_workflows/workflow.py +984 -0
- attune/metrics/__init__.py +12 -0
- attune/metrics/collector.py +31 -0
- attune/metrics/prompt_metrics.py +194 -0
- attune/models/__init__.py +172 -0
- attune/models/__main__.py +13 -0
- attune/models/adaptive_routing.py +437 -0
- attune/models/auth_cli.py +444 -0
- attune/models/auth_strategy.py +450 -0
- attune/models/cli.py +655 -0
- attune/models/empathy_executor.py +354 -0
- attune/models/executor.py +257 -0
- attune/models/fallback.py +762 -0
- attune/models/provider_config.py +282 -0
- attune/models/registry.py +472 -0
- attune/models/tasks.py +359 -0
- attune/models/telemetry/__init__.py +71 -0
- attune/models/telemetry/analytics.py +594 -0
- attune/models/telemetry/backend.py +196 -0
- attune/models/telemetry/data_models.py +431 -0
- attune/models/telemetry/storage.py +489 -0
- attune/models/token_estimator.py +420 -0
- attune/models/validation.py +280 -0
- attune/monitoring/__init__.py +52 -0
- attune/monitoring/alerts.py +946 -0
- attune/monitoring/alerts_cli.py +448 -0
- attune/monitoring/multi_backend.py +271 -0
- attune/monitoring/otel_backend.py +362 -0
- attune/optimization/__init__.py +19 -0
- attune/optimization/context_optimizer.py +272 -0
- attune/orchestration/__init__.py +67 -0
- attune/orchestration/agent_templates.py +707 -0
- attune/orchestration/config_store.py +499 -0
- attune/orchestration/execution_strategies.py +2111 -0
- attune/orchestration/meta_orchestrator.py +1168 -0
- attune/orchestration/pattern_learner.py +696 -0
- attune/orchestration/real_tools.py +931 -0
- attune/pattern_cache.py +187 -0
- attune/pattern_library.py +542 -0
- attune/patterns/debugging/all_patterns.json +81 -0
- attune/patterns/debugging/workflow_20260107_1770825e.json +77 -0
- attune/patterns/refactoring_memory.json +89 -0
- attune/persistence.py +564 -0
- attune/platform_utils.py +265 -0
- attune/plugins/__init__.py +28 -0
- attune/plugins/base.py +361 -0
- attune/plugins/registry.py +268 -0
- attune/project_index/__init__.py +32 -0
- attune/project_index/cli.py +335 -0
- attune/project_index/index.py +667 -0
- attune/project_index/models.py +504 -0
- attune/project_index/reports.py +474 -0
- attune/project_index/scanner.py +777 -0
- attune/project_index/scanner_parallel.py +291 -0
- attune/prompts/__init__.py +61 -0
- attune/prompts/config.py +77 -0
- attune/prompts/context.py +177 -0
- attune/prompts/parser.py +285 -0
- attune/prompts/registry.py +313 -0
- attune/prompts/templates.py +208 -0
- attune/redis_config.py +302 -0
- attune/redis_memory.py +799 -0
- attune/resilience/__init__.py +56 -0
- attune/resilience/circuit_breaker.py +256 -0
- attune/resilience/fallback.py +179 -0
- attune/resilience/health.py +300 -0
- attune/resilience/retry.py +209 -0
- attune/resilience/timeout.py +135 -0
- attune/routing/__init__.py +43 -0
- attune/routing/chain_executor.py +433 -0
- attune/routing/classifier.py +217 -0
- attune/routing/smart_router.py +234 -0
- attune/routing/workflow_registry.py +343 -0
- attune/scaffolding/README.md +589 -0
- attune/scaffolding/__init__.py +35 -0
- attune/scaffolding/__main__.py +14 -0
- attune/scaffolding/cli.py +240 -0
- attune/scaffolding/templates/base_wizard.py.jinja2 +121 -0
- attune/scaffolding/templates/coach_wizard.py.jinja2 +321 -0
- attune/scaffolding/templates/domain_wizard.py.jinja2 +408 -0
- attune/scaffolding/templates/linear_flow_wizard.py.jinja2 +203 -0
- attune/socratic/__init__.py +256 -0
- attune/socratic/ab_testing.py +958 -0
- attune/socratic/blueprint.py +533 -0
- attune/socratic/cli.py +703 -0
- attune/socratic/collaboration.py +1114 -0
- attune/socratic/domain_templates.py +924 -0
- attune/socratic/embeddings.py +738 -0
- attune/socratic/engine.py +794 -0
- attune/socratic/explainer.py +682 -0
- attune/socratic/feedback.py +772 -0
- attune/socratic/forms.py +629 -0
- attune/socratic/generator.py +732 -0
- attune/socratic/llm_analyzer.py +637 -0
- attune/socratic/mcp_server.py +702 -0
- attune/socratic/session.py +312 -0
- attune/socratic/storage.py +667 -0
- attune/socratic/success.py +730 -0
- attune/socratic/visual_editor.py +860 -0
- attune/socratic/web_ui.py +958 -0
- attune/telemetry/__init__.py +39 -0
- attune/telemetry/agent_coordination.py +475 -0
- attune/telemetry/agent_tracking.py +367 -0
- attune/telemetry/approval_gates.py +545 -0
- attune/telemetry/cli.py +1231 -0
- attune/telemetry/commands/__init__.py +14 -0
- attune/telemetry/commands/dashboard_commands.py +696 -0
- attune/telemetry/event_streaming.py +409 -0
- attune/telemetry/feedback_loop.py +567 -0
- attune/telemetry/usage_tracker.py +591 -0
- attune/templates.py +754 -0
- attune/test_generator/__init__.py +38 -0
- attune/test_generator/__main__.py +14 -0
- attune/test_generator/cli.py +234 -0
- attune/test_generator/generator.py +355 -0
- attune/test_generator/risk_analyzer.py +216 -0
- attune/test_generator/templates/unit_test.py.jinja2 +272 -0
- attune/tier_recommender.py +384 -0
- attune/tools.py +183 -0
- attune/trust/__init__.py +28 -0
- attune/trust/circuit_breaker.py +579 -0
- attune/trust_building.py +527 -0
- attune/validation/__init__.py +19 -0
- attune/validation/xml_validator.py +281 -0
- attune/vscode_bridge.py +173 -0
- attune/workflow_commands.py +780 -0
- attune/workflow_patterns/__init__.py +33 -0
- attune/workflow_patterns/behavior.py +249 -0
- attune/workflow_patterns/core.py +76 -0
- attune/workflow_patterns/output.py +99 -0
- attune/workflow_patterns/registry.py +255 -0
- attune/workflow_patterns/structural.py +288 -0
- attune/workflows/__init__.py +539 -0
- attune/workflows/autonomous_test_gen.py +1268 -0
- attune/workflows/base.py +2667 -0
- attune/workflows/batch_processing.py +342 -0
- attune/workflows/bug_predict.py +1084 -0
- attune/workflows/builder.py +273 -0
- attune/workflows/caching.py +253 -0
- attune/workflows/code_review.py +1048 -0
- attune/workflows/code_review_adapters.py +312 -0
- attune/workflows/code_review_pipeline.py +722 -0
- attune/workflows/config.py +645 -0
- attune/workflows/dependency_check.py +644 -0
- attune/workflows/document_gen/__init__.py +25 -0
- attune/workflows/document_gen/config.py +30 -0
- attune/workflows/document_gen/report_formatter.py +162 -0
- attune/workflows/document_gen/workflow.py +1426 -0
- attune/workflows/document_manager.py +216 -0
- attune/workflows/document_manager_README.md +134 -0
- attune/workflows/documentation_orchestrator.py +1205 -0
- attune/workflows/history.py +510 -0
- attune/workflows/keyboard_shortcuts/__init__.py +39 -0
- attune/workflows/keyboard_shortcuts/generators.py +391 -0
- attune/workflows/keyboard_shortcuts/parsers.py +416 -0
- attune/workflows/keyboard_shortcuts/prompts.py +295 -0
- attune/workflows/keyboard_shortcuts/schema.py +193 -0
- attune/workflows/keyboard_shortcuts/workflow.py +509 -0
- attune/workflows/llm_base.py +363 -0
- attune/workflows/manage_docs.py +87 -0
- attune/workflows/manage_docs_README.md +134 -0
- attune/workflows/manage_documentation.py +821 -0
- attune/workflows/new_sample_workflow1.py +149 -0
- attune/workflows/new_sample_workflow1_README.md +150 -0
- attune/workflows/orchestrated_health_check.py +849 -0
- attune/workflows/orchestrated_release_prep.py +600 -0
- attune/workflows/output.py +413 -0
- attune/workflows/perf_audit.py +863 -0
- attune/workflows/pr_review.py +762 -0
- attune/workflows/progress.py +785 -0
- attune/workflows/progress_server.py +322 -0
- attune/workflows/progressive/README 2.md +454 -0
- attune/workflows/progressive/README.md +454 -0
- attune/workflows/progressive/__init__.py +82 -0
- attune/workflows/progressive/cli.py +219 -0
- attune/workflows/progressive/core.py +488 -0
- attune/workflows/progressive/orchestrator.py +723 -0
- attune/workflows/progressive/reports.py +520 -0
- attune/workflows/progressive/telemetry.py +274 -0
- attune/workflows/progressive/test_gen.py +495 -0
- attune/workflows/progressive/workflow.py +589 -0
- attune/workflows/refactor_plan.py +694 -0
- attune/workflows/release_prep.py +895 -0
- attune/workflows/release_prep_crew.py +969 -0
- attune/workflows/research_synthesis.py +404 -0
- attune/workflows/routing.py +168 -0
- attune/workflows/secure_release.py +593 -0
- attune/workflows/security_adapters.py +297 -0
- attune/workflows/security_audit.py +1329 -0
- attune/workflows/security_audit_phase3.py +355 -0
- attune/workflows/seo_optimization.py +633 -0
- attune/workflows/step_config.py +234 -0
- attune/workflows/telemetry_mixin.py +269 -0
- attune/workflows/test5.py +125 -0
- attune/workflows/test5_README.md +158 -0
- attune/workflows/test_coverage_boost_crew.py +849 -0
- attune/workflows/test_gen/__init__.py +52 -0
- attune/workflows/test_gen/ast_analyzer.py +249 -0
- attune/workflows/test_gen/config.py +88 -0
- attune/workflows/test_gen/data_models.py +38 -0
- attune/workflows/test_gen/report_formatter.py +289 -0
- attune/workflows/test_gen/test_templates.py +381 -0
- attune/workflows/test_gen/workflow.py +655 -0
- attune/workflows/test_gen.py +54 -0
- attune/workflows/test_gen_behavioral.py +477 -0
- attune/workflows/test_gen_parallel.py +341 -0
- attune/workflows/test_lifecycle.py +526 -0
- attune/workflows/test_maintenance.py +627 -0
- attune/workflows/test_maintenance_cli.py +590 -0
- attune/workflows/test_maintenance_crew.py +840 -0
- attune/workflows/test_runner.py +622 -0
- attune/workflows/tier_tracking.py +531 -0
- attune/workflows/xml_enhanced_crew.py +285 -0
- attune_ai-2.0.0.dist-info/METADATA +1026 -0
- attune_ai-2.0.0.dist-info/RECORD +457 -0
- attune_ai-2.0.0.dist-info/WHEEL +5 -0
- attune_ai-2.0.0.dist-info/entry_points.txt +26 -0
- attune_ai-2.0.0.dist-info/licenses/LICENSE +201 -0
- attune_ai-2.0.0.dist-info/licenses/LICENSE_CHANGE_ANNOUNCEMENT.md +101 -0
- attune_ai-2.0.0.dist-info/top_level.txt +5 -0
- attune_healthcare/__init__.py +13 -0
- attune_healthcare/monitors/__init__.py +9 -0
- attune_healthcare/monitors/clinical_protocol_monitor.py +315 -0
- attune_healthcare/monitors/monitoring/__init__.py +44 -0
- attune_healthcare/monitors/monitoring/protocol_checker.py +300 -0
- attune_healthcare/monitors/monitoring/protocol_loader.py +214 -0
- attune_healthcare/monitors/monitoring/sensor_parsers.py +306 -0
- attune_healthcare/monitors/monitoring/trajectory_analyzer.py +389 -0
- attune_llm/README.md +553 -0
- attune_llm/__init__.py +28 -0
- attune_llm/agent_factory/__init__.py +53 -0
- attune_llm/agent_factory/adapters/__init__.py +85 -0
- attune_llm/agent_factory/adapters/autogen_adapter.py +312 -0
- attune_llm/agent_factory/adapters/crewai_adapter.py +483 -0
- attune_llm/agent_factory/adapters/haystack_adapter.py +298 -0
- attune_llm/agent_factory/adapters/langchain_adapter.py +362 -0
- attune_llm/agent_factory/adapters/langgraph_adapter.py +333 -0
- attune_llm/agent_factory/adapters/native.py +228 -0
- attune_llm/agent_factory/adapters/wizard_adapter.py +423 -0
- attune_llm/agent_factory/base.py +305 -0
- attune_llm/agent_factory/crews/__init__.py +67 -0
- attune_llm/agent_factory/crews/code_review.py +1113 -0
- attune_llm/agent_factory/crews/health_check.py +1262 -0
- attune_llm/agent_factory/crews/refactoring.py +1128 -0
- attune_llm/agent_factory/crews/security_audit.py +1018 -0
- attune_llm/agent_factory/decorators.py +287 -0
- attune_llm/agent_factory/factory.py +558 -0
- attune_llm/agent_factory/framework.py +193 -0
- attune_llm/agent_factory/memory_integration.py +328 -0
- attune_llm/agent_factory/resilient.py +320 -0
- attune_llm/agents_md/__init__.py +22 -0
- attune_llm/agents_md/loader.py +218 -0
- attune_llm/agents_md/parser.py +271 -0
- attune_llm/agents_md/registry.py +307 -0
- attune_llm/claude_memory.py +466 -0
- attune_llm/cli/__init__.py +8 -0
- attune_llm/cli/sync_claude.py +487 -0
- attune_llm/code_health.py +1313 -0
- attune_llm/commands/__init__.py +51 -0
- attune_llm/commands/context.py +375 -0
- attune_llm/commands/loader.py +301 -0
- attune_llm/commands/models.py +231 -0
- attune_llm/commands/parser.py +371 -0
- attune_llm/commands/registry.py +429 -0
- attune_llm/config/__init__.py +29 -0
- attune_llm/config/unified.py +291 -0
- attune_llm/context/__init__.py +22 -0
- attune_llm/context/compaction.py +455 -0
- attune_llm/context/manager.py +434 -0
- attune_llm/contextual_patterns.py +361 -0
- attune_llm/core.py +907 -0
- attune_llm/git_pattern_extractor.py +435 -0
- attune_llm/hooks/__init__.py +24 -0
- attune_llm/hooks/config.py +306 -0
- attune_llm/hooks/executor.py +289 -0
- attune_llm/hooks/registry.py +302 -0
- attune_llm/hooks/scripts/__init__.py +39 -0
- attune_llm/hooks/scripts/evaluate_session.py +201 -0
- attune_llm/hooks/scripts/first_time_init.py +285 -0
- attune_llm/hooks/scripts/pre_compact.py +207 -0
- attune_llm/hooks/scripts/session_end.py +183 -0
- attune_llm/hooks/scripts/session_start.py +163 -0
- attune_llm/hooks/scripts/suggest_compact.py +225 -0
- attune_llm/learning/__init__.py +30 -0
- attune_llm/learning/evaluator.py +438 -0
- attune_llm/learning/extractor.py +514 -0
- attune_llm/learning/storage.py +560 -0
- attune_llm/levels.py +227 -0
- attune_llm/pattern_confidence.py +414 -0
- attune_llm/pattern_resolver.py +272 -0
- attune_llm/pattern_summary.py +350 -0
- attune_llm/providers.py +967 -0
- attune_llm/routing/__init__.py +32 -0
- attune_llm/routing/model_router.py +362 -0
- attune_llm/security/IMPLEMENTATION_SUMMARY.md +413 -0
- attune_llm/security/PHASE2_COMPLETE.md +384 -0
- attune_llm/security/PHASE2_SECRETS_DETECTOR_COMPLETE.md +271 -0
- attune_llm/security/QUICK_REFERENCE.md +316 -0
- attune_llm/security/README.md +262 -0
- attune_llm/security/__init__.py +62 -0
- attune_llm/security/audit_logger.py +929 -0
- attune_llm/security/audit_logger_example.py +152 -0
- attune_llm/security/pii_scrubber.py +640 -0
- attune_llm/security/secrets_detector.py +678 -0
- attune_llm/security/secrets_detector_example.py +304 -0
- attune_llm/security/secure_memdocs.py +1192 -0
- attune_llm/security/secure_memdocs_example.py +278 -0
- attune_llm/session_status.py +745 -0
- attune_llm/state.py +246 -0
- attune_llm/utils/__init__.py +5 -0
- attune_llm/utils/tokens.py +349 -0
- attune_software/SOFTWARE_PLUGIN_README.md +57 -0
- attune_software/__init__.py +13 -0
- attune_software/cli/__init__.py +120 -0
- attune_software/cli/inspect.py +362 -0
- attune_software/cli.py +574 -0
- attune_software/plugin.py +188 -0
- workflow_scaffolding/__init__.py +11 -0
- workflow_scaffolding/__main__.py +12 -0
- workflow_scaffolding/cli.py +206 -0
- workflow_scaffolding/generator.py +265 -0
|
@@ -0,0 +1,678 @@
|
|
|
1
|
+
"""Secrets Detection Module
|
|
2
|
+
|
|
3
|
+
Comprehensive secrets detection for enterprise privacy integration.
|
|
4
|
+
Detects API keys, passwords, private keys, OAuth tokens, JWT tokens, database
|
|
5
|
+
connection strings, and other sensitive credentials.
|
|
6
|
+
|
|
7
|
+
CRITICAL: This module NEVER logs or returns actual secret values. It only
|
|
8
|
+
returns metadata about detections (type, location, severity).
|
|
9
|
+
|
|
10
|
+
Author: Empathy Framework Team
|
|
11
|
+
Version: 1.8.0-beta
|
|
12
|
+
License: Fair Source 0.9
|
|
13
|
+
"""
|
|
14
|
+
|
|
15
|
+
import math
|
|
16
|
+
import re
|
|
17
|
+
from collections import Counter
|
|
18
|
+
from dataclasses import dataclass, field
|
|
19
|
+
from enum import Enum
|
|
20
|
+
from re import Pattern
|
|
21
|
+
|
|
22
|
+
import structlog
|
|
23
|
+
|
|
24
|
+
logger = structlog.get_logger(__name__)
|
|
25
|
+
|
|
26
|
+
|
|
27
|
+
class SecretType(Enum):
|
|
28
|
+
"""Types of secrets that can be detected"""
|
|
29
|
+
|
|
30
|
+
# API Keys
|
|
31
|
+
ANTHROPIC_API_KEY = "anthropic_api_key"
|
|
32
|
+
OPENAI_API_KEY = "openai_api_key"
|
|
33
|
+
AWS_ACCESS_KEY = "aws_access_key"
|
|
34
|
+
AWS_SECRET_KEY = "aws_secret_key"
|
|
35
|
+
GITHUB_TOKEN = "github_token"
|
|
36
|
+
SLACK_TOKEN = "slack_token"
|
|
37
|
+
STRIPE_KEY = "stripe_key"
|
|
38
|
+
GENERIC_API_KEY = "generic_api_key"
|
|
39
|
+
|
|
40
|
+
# Passwords
|
|
41
|
+
PASSWORD = "password"
|
|
42
|
+
BASIC_AUTH = "basic_auth"
|
|
43
|
+
|
|
44
|
+
# Private Keys
|
|
45
|
+
RSA_PRIVATE_KEY = "rsa_private_key"
|
|
46
|
+
SSH_PRIVATE_KEY = "ssh_private_key"
|
|
47
|
+
EC_PRIVATE_KEY = "ec_private_key"
|
|
48
|
+
PGP_PRIVATE_KEY = "pgp_private_key"
|
|
49
|
+
TLS_CERTIFICATE_KEY = "tls_certificate_key"
|
|
50
|
+
|
|
51
|
+
# Tokens
|
|
52
|
+
JWT_TOKEN = "jwt_token"
|
|
53
|
+
OAUTH_TOKEN = "oauth_token"
|
|
54
|
+
BEARER_TOKEN = "bearer_token"
|
|
55
|
+
|
|
56
|
+
# Database
|
|
57
|
+
DATABASE_URL = "database_url"
|
|
58
|
+
CONNECTION_STRING = "connection_string"
|
|
59
|
+
|
|
60
|
+
# High Entropy
|
|
61
|
+
HIGH_ENTROPY_STRING = "high_entropy_string"
|
|
62
|
+
|
|
63
|
+
|
|
64
|
+
class Severity(Enum):
|
|
65
|
+
"""Severity levels for secret detections"""
|
|
66
|
+
|
|
67
|
+
CRITICAL = "critical" # Private keys, AWS credentials
|
|
68
|
+
HIGH = "high" # API keys, passwords
|
|
69
|
+
MEDIUM = "medium" # OAuth tokens, JWT
|
|
70
|
+
LOW = "low" # Potential secrets, high entropy strings
|
|
71
|
+
|
|
72
|
+
|
|
73
|
+
@dataclass
|
|
74
|
+
class SecretDetection:
|
|
75
|
+
"""Metadata about a detected secret.
|
|
76
|
+
|
|
77
|
+
CRITICAL: The actual secret value is NEVER stored in this object.
|
|
78
|
+
"""
|
|
79
|
+
|
|
80
|
+
secret_type: SecretType
|
|
81
|
+
severity: Severity
|
|
82
|
+
line_number: int
|
|
83
|
+
column_start: int
|
|
84
|
+
column_end: int
|
|
85
|
+
context_snippet: str = "" # Surrounding text (without the secret itself)
|
|
86
|
+
confidence: float = 1.0 # 0.0 to 1.0
|
|
87
|
+
metadata: dict = field(default_factory=dict)
|
|
88
|
+
|
|
89
|
+
def to_dict(self) -> dict:
|
|
90
|
+
"""Convert to dictionary for logging/serialization"""
|
|
91
|
+
return {
|
|
92
|
+
"secret_type": self.secret_type.value,
|
|
93
|
+
"severity": self.severity.value,
|
|
94
|
+
"line_number": self.line_number,
|
|
95
|
+
"column_start": self.column_start,
|
|
96
|
+
"column_end": self.column_end,
|
|
97
|
+
"context_snippet": self.context_snippet,
|
|
98
|
+
"confidence": self.confidence,
|
|
99
|
+
"metadata": self.metadata,
|
|
100
|
+
}
|
|
101
|
+
|
|
102
|
+
|
|
103
|
+
class SecretsDetector:
|
|
104
|
+
"""Detects secrets in text content using pattern matching and entropy analysis.
|
|
105
|
+
|
|
106
|
+
This detector is designed for high performance with compiled regex patterns
|
|
107
|
+
and early exit on detection. It supports custom patterns and provides
|
|
108
|
+
detailed detection metadata without exposing actual secret values.
|
|
109
|
+
|
|
110
|
+
Example:
|
|
111
|
+
>>> detector = SecretsDetector()
|
|
112
|
+
>>> detections = detector.detect("api_key = 'sk_live_abc123xyz789'")
|
|
113
|
+
>>> if detections:
|
|
114
|
+
... print(f"Found {len(detections)} secrets")
|
|
115
|
+
... for detection in detections:
|
|
116
|
+
... print(f" - {detection.secret_type.value} at line {detection.line_number}")
|
|
117
|
+
|
|
118
|
+
"""
|
|
119
|
+
|
|
120
|
+
def __init__(
|
|
121
|
+
self,
|
|
122
|
+
enable_entropy_analysis: bool = True,
|
|
123
|
+
entropy_threshold: float = 4.5,
|
|
124
|
+
min_entropy_length: int = 20,
|
|
125
|
+
max_context_chars: int = 50,
|
|
126
|
+
):
|
|
127
|
+
"""Initialize secrets detector.
|
|
128
|
+
|
|
129
|
+
Args:
|
|
130
|
+
enable_entropy_analysis: Whether to detect high-entropy strings
|
|
131
|
+
entropy_threshold: Minimum entropy for detection (4.5 is recommended)
|
|
132
|
+
min_entropy_length: Minimum string length for entropy analysis
|
|
133
|
+
max_context_chars: Maximum characters to include in context snippet
|
|
134
|
+
|
|
135
|
+
"""
|
|
136
|
+
self.enable_entropy_analysis = enable_entropy_analysis
|
|
137
|
+
self.entropy_threshold = entropy_threshold
|
|
138
|
+
self.min_entropy_length = min_entropy_length
|
|
139
|
+
self.max_context_chars = max_context_chars
|
|
140
|
+
|
|
141
|
+
# Compile regex patterns for performance
|
|
142
|
+
self._patterns: dict[SecretType, tuple[Pattern, Severity]] = {}
|
|
143
|
+
self._custom_patterns: dict[str, tuple[Pattern, Severity]] = {}
|
|
144
|
+
self._initialize_patterns()
|
|
145
|
+
|
|
146
|
+
logger.debug(
|
|
147
|
+
"secrets_detector_initialized",
|
|
148
|
+
patterns_count=len(self._patterns),
|
|
149
|
+
entropy_analysis=enable_entropy_analysis,
|
|
150
|
+
)
|
|
151
|
+
|
|
152
|
+
def _initialize_patterns(self):
|
|
153
|
+
"""Initialize compiled regex patterns for all secret types"""
|
|
154
|
+
# Anthropic API Keys (sk-ant-...)
|
|
155
|
+
self._patterns[SecretType.ANTHROPIC_API_KEY] = (
|
|
156
|
+
re.compile(
|
|
157
|
+
r"(?i)(?:anthropic[_-]?api[_-]?key|ANTHROPIC_API_KEY)\s*[=:]\s*[\"']?(sk-ant-[a-zA-Z0-9_-]{95,})[\"']?",
|
|
158
|
+
re.MULTILINE,
|
|
159
|
+
),
|
|
160
|
+
Severity.HIGH,
|
|
161
|
+
)
|
|
162
|
+
|
|
163
|
+
# OpenAI API Keys (sk-...)
|
|
164
|
+
self._patterns[SecretType.OPENAI_API_KEY] = (
|
|
165
|
+
re.compile(
|
|
166
|
+
r"(?i)(?:openai[_-]?api[_-]?key|OPENAI_API_KEY)\s*[=:]\s*[\"']?(sk-[a-zA-Z0-9]{20,})[\"']?",
|
|
167
|
+
re.MULTILINE,
|
|
168
|
+
),
|
|
169
|
+
Severity.HIGH,
|
|
170
|
+
)
|
|
171
|
+
|
|
172
|
+
# AWS Access Key (AKIA...)
|
|
173
|
+
self._patterns[SecretType.AWS_ACCESS_KEY] = (
|
|
174
|
+
re.compile(r"\b(AKIA[A-Z0-9]{16})\b", re.MULTILINE),
|
|
175
|
+
Severity.CRITICAL,
|
|
176
|
+
)
|
|
177
|
+
|
|
178
|
+
# AWS Secret Access Key
|
|
179
|
+
self._patterns[SecretType.AWS_SECRET_KEY] = (
|
|
180
|
+
re.compile(
|
|
181
|
+
r"(?i)(?:aws[_-]?secret[_-]?access[_-]?key|AWS_SECRET_ACCESS_KEY)\s*[=:]\s*[\"']?([a-zA-Z0-9/+=]{40})[\"']?",
|
|
182
|
+
re.MULTILINE,
|
|
183
|
+
),
|
|
184
|
+
Severity.CRITICAL,
|
|
185
|
+
)
|
|
186
|
+
|
|
187
|
+
# GitHub Token (ghp_, gho_, ghs_, ghr_)
|
|
188
|
+
self._patterns[SecretType.GITHUB_TOKEN] = (
|
|
189
|
+
re.compile(r"\b(gh[pousr]_[a-zA-Z0-9]{36,})\b", re.MULTILINE),
|
|
190
|
+
Severity.HIGH,
|
|
191
|
+
)
|
|
192
|
+
|
|
193
|
+
# Slack Tokens (xox[abprs]-...)
|
|
194
|
+
self._patterns[SecretType.SLACK_TOKEN] = (
|
|
195
|
+
re.compile(r"\b(xox[abprs]-[a-zA-Z0-9-]+)\b", re.MULTILINE),
|
|
196
|
+
Severity.HIGH,
|
|
197
|
+
)
|
|
198
|
+
|
|
199
|
+
# Stripe Keys (sk_live_, pk_live_, sk_test_)
|
|
200
|
+
self._patterns[SecretType.STRIPE_KEY] = (
|
|
201
|
+
re.compile(r"\b([sp]k_(?:live|test)_[a-zA-Z0-9]{24,})\b", re.MULTILINE),
|
|
202
|
+
Severity.HIGH,
|
|
203
|
+
)
|
|
204
|
+
|
|
205
|
+
# Generic API Key patterns
|
|
206
|
+
self._patterns[SecretType.GENERIC_API_KEY] = (
|
|
207
|
+
re.compile(
|
|
208
|
+
r"(?i)(?:api[_-]?key|apikey|access[_-]?token)\s*[=:]\s*[\"']?([a-zA-Z0-9_-]{20,})[\"']?",
|
|
209
|
+
re.MULTILINE,
|
|
210
|
+
),
|
|
211
|
+
Severity.HIGH,
|
|
212
|
+
)
|
|
213
|
+
|
|
214
|
+
# Password assignments
|
|
215
|
+
self._patterns[SecretType.PASSWORD] = (
|
|
216
|
+
re.compile(
|
|
217
|
+
r"(?i)(?:password|passwd|pwd|pass)\s*[=:]\s*[\"']([^\"'\s]{4,})[\"']",
|
|
218
|
+
re.MULTILINE,
|
|
219
|
+
),
|
|
220
|
+
Severity.HIGH,
|
|
221
|
+
)
|
|
222
|
+
|
|
223
|
+
# Basic Auth (base64 encoded user:pass)
|
|
224
|
+
self._patterns[SecretType.BASIC_AUTH] = (
|
|
225
|
+
re.compile(
|
|
226
|
+
r"(?i)(?:authorization:\s*basic\s+|basic\s+auth\s*[=:]\s*)([a-zA-Z0-9+/]{20,}={0,2})",
|
|
227
|
+
re.MULTILINE,
|
|
228
|
+
),
|
|
229
|
+
Severity.HIGH,
|
|
230
|
+
)
|
|
231
|
+
|
|
232
|
+
# RSA Private Keys
|
|
233
|
+
self._patterns[SecretType.RSA_PRIVATE_KEY] = (
|
|
234
|
+
re.compile(r"-----BEGIN RSA PRIVATE KEY-----", re.MULTILINE),
|
|
235
|
+
Severity.CRITICAL,
|
|
236
|
+
)
|
|
237
|
+
|
|
238
|
+
# SSH Private Keys
|
|
239
|
+
self._patterns[SecretType.SSH_PRIVATE_KEY] = (
|
|
240
|
+
re.compile(r"-----BEGIN OPENSSH PRIVATE KEY-----", re.MULTILINE),
|
|
241
|
+
Severity.CRITICAL,
|
|
242
|
+
)
|
|
243
|
+
|
|
244
|
+
# EC Private Keys
|
|
245
|
+
self._patterns[SecretType.EC_PRIVATE_KEY] = (
|
|
246
|
+
re.compile(r"-----BEGIN EC PRIVATE KEY-----", re.MULTILINE),
|
|
247
|
+
Severity.CRITICAL,
|
|
248
|
+
)
|
|
249
|
+
|
|
250
|
+
# PGP Private Keys
|
|
251
|
+
self._patterns[SecretType.PGP_PRIVATE_KEY] = (
|
|
252
|
+
re.compile(r"-----BEGIN PGP PRIVATE KEY BLOCK-----", re.MULTILINE),
|
|
253
|
+
Severity.CRITICAL,
|
|
254
|
+
)
|
|
255
|
+
|
|
256
|
+
# TLS/SSL Certificate Keys
|
|
257
|
+
self._patterns[SecretType.TLS_CERTIFICATE_KEY] = (
|
|
258
|
+
re.compile(r"-----BEGIN PRIVATE KEY-----", re.MULTILINE),
|
|
259
|
+
Severity.CRITICAL,
|
|
260
|
+
)
|
|
261
|
+
|
|
262
|
+
# JWT Tokens (eyJ...)
|
|
263
|
+
self._patterns[SecretType.JWT_TOKEN] = (
|
|
264
|
+
re.compile(r"\b(eyJ[a-zA-Z0-9_-]+\.eyJ[a-zA-Z0-9_-]+\.[a-zA-Z0-9_-]+)\b", re.MULTILINE),
|
|
265
|
+
Severity.MEDIUM,
|
|
266
|
+
)
|
|
267
|
+
|
|
268
|
+
# OAuth Access Tokens
|
|
269
|
+
self._patterns[SecretType.OAUTH_TOKEN] = (
|
|
270
|
+
re.compile(
|
|
271
|
+
r"(?i)(?:oauth[_-]?token|access[_-]?token)\s*[=:]\s*[\"']?([a-zA-Z0-9_-]{20,})[\"']?",
|
|
272
|
+
re.MULTILINE,
|
|
273
|
+
),
|
|
274
|
+
Severity.MEDIUM,
|
|
275
|
+
)
|
|
276
|
+
|
|
277
|
+
# Bearer Tokens
|
|
278
|
+
self._patterns[SecretType.BEARER_TOKEN] = (
|
|
279
|
+
re.compile(
|
|
280
|
+
r"(?i)(?:authorization:\s*bearer\s+|bearer\s+token\s*[=:]\s*)([a-zA-Z0-9_-]{20,})",
|
|
281
|
+
re.MULTILINE,
|
|
282
|
+
),
|
|
283
|
+
Severity.MEDIUM,
|
|
284
|
+
)
|
|
285
|
+
|
|
286
|
+
# Database URLs
|
|
287
|
+
self._patterns[SecretType.DATABASE_URL] = (
|
|
288
|
+
re.compile(
|
|
289
|
+
r"(?i)(?:postgres|mysql|mongodb|redis)://[a-zA-Z0-9_-]+:[^@\s]+@[a-zA-Z0-9.-]+",
|
|
290
|
+
re.MULTILINE,
|
|
291
|
+
),
|
|
292
|
+
Severity.HIGH,
|
|
293
|
+
)
|
|
294
|
+
|
|
295
|
+
# Database Connection Strings
|
|
296
|
+
self._patterns[SecretType.CONNECTION_STRING] = (
|
|
297
|
+
re.compile(
|
|
298
|
+
r"(?i)(?:connection[_-]?string|database[_-]?url|db[_-]?url)\s*[=:]\s*[\"']([^\"']+)[\"']",
|
|
299
|
+
re.MULTILINE,
|
|
300
|
+
),
|
|
301
|
+
Severity.HIGH,
|
|
302
|
+
)
|
|
303
|
+
|
|
304
|
+
def detect(self, content: str) -> list[SecretDetection]:
|
|
305
|
+
"""Detect secrets in content.
|
|
306
|
+
|
|
307
|
+
Args:
|
|
308
|
+
content: Text content to scan for secrets
|
|
309
|
+
|
|
310
|
+
Returns:
|
|
311
|
+
List of SecretDetection objects (NEVER containing actual secret values)
|
|
312
|
+
|
|
313
|
+
Example:
|
|
314
|
+
>>> detector = SecretsDetector()
|
|
315
|
+
>>> detections = detector.detect(code_content)
|
|
316
|
+
>>> for detection in detections:
|
|
317
|
+
... print(f"Found {detection.secret_type.value} at line {detection.line_number}")
|
|
318
|
+
|
|
319
|
+
"""
|
|
320
|
+
if not content:
|
|
321
|
+
return []
|
|
322
|
+
|
|
323
|
+
detections: list[SecretDetection] = []
|
|
324
|
+
|
|
325
|
+
# Split content into lines for line number tracking
|
|
326
|
+
lines = content.split("\n")
|
|
327
|
+
|
|
328
|
+
# Scan with all patterns
|
|
329
|
+
for secret_type, (pattern, severity) in self._patterns.items():
|
|
330
|
+
for match in pattern.finditer(content):
|
|
331
|
+
detection = self._create_detection(
|
|
332
|
+
secret_type=secret_type,
|
|
333
|
+
severity=severity,
|
|
334
|
+
match=match,
|
|
335
|
+
content=content,
|
|
336
|
+
lines=lines,
|
|
337
|
+
)
|
|
338
|
+
detections.append(detection)
|
|
339
|
+
|
|
340
|
+
# Scan with custom patterns
|
|
341
|
+
for name, (pattern, severity) in self._custom_patterns.items():
|
|
342
|
+
for match in pattern.finditer(content):
|
|
343
|
+
# Create a custom secret type
|
|
344
|
+
custom_type = SecretType.GENERIC_API_KEY # Default fallback
|
|
345
|
+
detection = self._create_detection(
|
|
346
|
+
secret_type=custom_type,
|
|
347
|
+
severity=severity,
|
|
348
|
+
match=match,
|
|
349
|
+
content=content,
|
|
350
|
+
lines=lines,
|
|
351
|
+
metadata={"custom_pattern": name},
|
|
352
|
+
)
|
|
353
|
+
detections.append(detection)
|
|
354
|
+
|
|
355
|
+
# Entropy analysis for unknown secrets
|
|
356
|
+
if self.enable_entropy_analysis:
|
|
357
|
+
entropy_detections = self._detect_high_entropy(content, lines)
|
|
358
|
+
# Filter out entropy detections that overlap with pattern detections
|
|
359
|
+
entropy_detections = self._filter_overlapping_detections(entropy_detections, detections)
|
|
360
|
+
detections.extend(entropy_detections)
|
|
361
|
+
|
|
362
|
+
# Sort by line number
|
|
363
|
+
detections.sort(key=lambda d: (d.line_number, d.column_start))
|
|
364
|
+
|
|
365
|
+
if detections:
|
|
366
|
+
logger.warning(
|
|
367
|
+
"secrets_detected",
|
|
368
|
+
count=len(detections),
|
|
369
|
+
types=[d.secret_type.value for d in detections],
|
|
370
|
+
)
|
|
371
|
+
else:
|
|
372
|
+
logger.debug("no_secrets_detected")
|
|
373
|
+
|
|
374
|
+
return detections
|
|
375
|
+
|
|
376
|
+
def _create_detection(
|
|
377
|
+
self,
|
|
378
|
+
secret_type: SecretType,
|
|
379
|
+
severity: Severity,
|
|
380
|
+
match: re.Match,
|
|
381
|
+
content: str,
|
|
382
|
+
lines: list[str],
|
|
383
|
+
metadata: dict | None = None,
|
|
384
|
+
) -> SecretDetection:
|
|
385
|
+
"""Create a SecretDetection from a regex match"""
|
|
386
|
+
# Find line number and column
|
|
387
|
+
line_number, column_start = self._get_line_column(content, match.start())
|
|
388
|
+
_, column_end = self._get_line_column(content, match.end())
|
|
389
|
+
|
|
390
|
+
# Create context snippet (without the actual secret)
|
|
391
|
+
context_snippet = self._create_context_snippet(lines, line_number, column_start, column_end)
|
|
392
|
+
|
|
393
|
+
return SecretDetection(
|
|
394
|
+
secret_type=secret_type,
|
|
395
|
+
severity=severity,
|
|
396
|
+
line_number=line_number,
|
|
397
|
+
column_start=column_start,
|
|
398
|
+
column_end=column_end,
|
|
399
|
+
context_snippet=context_snippet,
|
|
400
|
+
confidence=1.0, # Pattern matches are high confidence
|
|
401
|
+
metadata=metadata or {},
|
|
402
|
+
)
|
|
403
|
+
|
|
404
|
+
def _get_line_column(self, content: str, position: int) -> tuple[int, int]:
|
|
405
|
+
"""Convert absolute position to line number and column"""
|
|
406
|
+
lines_before = content[:position].split("\n")
|
|
407
|
+
line_number = len(lines_before)
|
|
408
|
+
column = len(lines_before[-1])
|
|
409
|
+
return line_number, column
|
|
410
|
+
|
|
411
|
+
def _create_context_snippet(
|
|
412
|
+
self,
|
|
413
|
+
lines: list[str],
|
|
414
|
+
line_number: int,
|
|
415
|
+
column_start: int,
|
|
416
|
+
column_end: int,
|
|
417
|
+
) -> str:
|
|
418
|
+
"""Create a context snippet showing where the secret was found.
|
|
419
|
+
|
|
420
|
+
The actual secret value is replaced with [REDACTED].
|
|
421
|
+
"""
|
|
422
|
+
if line_number < 1 or line_number > len(lines):
|
|
423
|
+
return ""
|
|
424
|
+
|
|
425
|
+
line = lines[line_number - 1]
|
|
426
|
+
|
|
427
|
+
# Replace the secret with [REDACTED]
|
|
428
|
+
before = line[:column_start]
|
|
429
|
+
after = line[column_end:]
|
|
430
|
+
redacted_line = before + "[REDACTED]" + after
|
|
431
|
+
|
|
432
|
+
# Truncate if too long
|
|
433
|
+
if len(redacted_line) > self.max_context_chars:
|
|
434
|
+
# Try to center around the redaction
|
|
435
|
+
start = max(0, column_start - self.max_context_chars // 2)
|
|
436
|
+
end = min(len(redacted_line), start + self.max_context_chars)
|
|
437
|
+
redacted_line = redacted_line[start:end]
|
|
438
|
+
if start > 0:
|
|
439
|
+
redacted_line = "..." + redacted_line
|
|
440
|
+
if end < len(line):
|
|
441
|
+
redacted_line = redacted_line + "..."
|
|
442
|
+
|
|
443
|
+
return redacted_line
|
|
444
|
+
|
|
445
|
+
def _detect_high_entropy(self, content: str, lines: list[str]) -> list[SecretDetection]:
|
|
446
|
+
"""Detect high-entropy strings that might be secrets.
|
|
447
|
+
|
|
448
|
+
Uses Shannon entropy to identify random-looking strings.
|
|
449
|
+
"""
|
|
450
|
+
detections = []
|
|
451
|
+
|
|
452
|
+
# Find strings (quoted or in assignments)
|
|
453
|
+
string_pattern = re.compile(
|
|
454
|
+
r'(?:["\'])([a-zA-Z0-9_\-+=\/]{' + str(self.min_entropy_length) + r',})["\']',
|
|
455
|
+
re.MULTILINE,
|
|
456
|
+
)
|
|
457
|
+
|
|
458
|
+
for match in string_pattern.finditer(content):
|
|
459
|
+
string_value = match.group(1)
|
|
460
|
+
|
|
461
|
+
# Calculate entropy
|
|
462
|
+
entropy = self._calculate_entropy(string_value)
|
|
463
|
+
|
|
464
|
+
if entropy >= self.entropy_threshold:
|
|
465
|
+
line_number, column_start = self._get_line_column(content, match.start())
|
|
466
|
+
_, column_end = self._get_line_column(content, match.end())
|
|
467
|
+
|
|
468
|
+
context_snippet = self._create_context_snippet(
|
|
469
|
+
lines,
|
|
470
|
+
line_number,
|
|
471
|
+
column_start,
|
|
472
|
+
column_end,
|
|
473
|
+
)
|
|
474
|
+
|
|
475
|
+
# Confidence based on entropy (higher entropy = higher confidence)
|
|
476
|
+
confidence = min(1.0, (entropy - self.entropy_threshold) / 2.0 + 0.5)
|
|
477
|
+
|
|
478
|
+
detections.append(
|
|
479
|
+
SecretDetection(
|
|
480
|
+
secret_type=SecretType.HIGH_ENTROPY_STRING,
|
|
481
|
+
severity=Severity.LOW,
|
|
482
|
+
line_number=line_number,
|
|
483
|
+
column_start=column_start,
|
|
484
|
+
column_end=column_end,
|
|
485
|
+
context_snippet=context_snippet,
|
|
486
|
+
confidence=confidence,
|
|
487
|
+
metadata={"entropy": round(entropy, 2), "length": len(string_value)},
|
|
488
|
+
),
|
|
489
|
+
)
|
|
490
|
+
|
|
491
|
+
return detections
|
|
492
|
+
|
|
493
|
+
def _calculate_entropy(self, string: str) -> float:
|
|
494
|
+
"""Calculate Shannon entropy of a string.
|
|
495
|
+
|
|
496
|
+
Higher entropy indicates more randomness (potential secret).
|
|
497
|
+
|
|
498
|
+
Args:
|
|
499
|
+
string: Input string
|
|
500
|
+
|
|
501
|
+
Returns:
|
|
502
|
+
Entropy value (typically 0-8 for base64/hex strings)
|
|
503
|
+
|
|
504
|
+
"""
|
|
505
|
+
if not string:
|
|
506
|
+
return 0.0
|
|
507
|
+
|
|
508
|
+
# Count character frequencies
|
|
509
|
+
char_counts = Counter(string)
|
|
510
|
+
length = len(string)
|
|
511
|
+
|
|
512
|
+
# Calculate Shannon entropy
|
|
513
|
+
entropy = 0.0
|
|
514
|
+
for count in char_counts.values():
|
|
515
|
+
probability = count / length
|
|
516
|
+
entropy -= probability * math.log2(probability)
|
|
517
|
+
|
|
518
|
+
return entropy
|
|
519
|
+
|
|
520
|
+
def _filter_overlapping_detections(
|
|
521
|
+
self,
|
|
522
|
+
entropy_detections: list[SecretDetection],
|
|
523
|
+
pattern_detections: list[SecretDetection],
|
|
524
|
+
) -> list[SecretDetection]:
|
|
525
|
+
"""Filter out entropy detections that overlap with pattern detections.
|
|
526
|
+
|
|
527
|
+
Pattern detections have higher confidence, so we prefer them.
|
|
528
|
+
"""
|
|
529
|
+
filtered = []
|
|
530
|
+
|
|
531
|
+
for entropy_detection in entropy_detections:
|
|
532
|
+
overlaps = False
|
|
533
|
+
|
|
534
|
+
for pattern_detection in pattern_detections:
|
|
535
|
+
# Check if they're on the same line with overlapping columns
|
|
536
|
+
if entropy_detection.line_number == pattern_detection.line_number:
|
|
537
|
+
# Check for column overlap
|
|
538
|
+
if not (
|
|
539
|
+
entropy_detection.column_end < pattern_detection.column_start
|
|
540
|
+
or entropy_detection.column_start > pattern_detection.column_end
|
|
541
|
+
):
|
|
542
|
+
overlaps = True
|
|
543
|
+
break
|
|
544
|
+
|
|
545
|
+
if not overlaps:
|
|
546
|
+
filtered.append(entropy_detection)
|
|
547
|
+
|
|
548
|
+
return filtered
|
|
549
|
+
|
|
550
|
+
def add_custom_pattern(self, name: str, pattern: str, severity: str):
|
|
551
|
+
"""Add a custom secret pattern.
|
|
552
|
+
|
|
553
|
+
Args:
|
|
554
|
+
name: Name for this pattern (e.g., "company_api_key")
|
|
555
|
+
pattern: Regex pattern string
|
|
556
|
+
severity: "critical", "high", "medium", or "low"
|
|
557
|
+
|
|
558
|
+
Example:
|
|
559
|
+
>>> detector = SecretsDetector()
|
|
560
|
+
>>> detector.add_custom_pattern(
|
|
561
|
+
... name="acme_api_key",
|
|
562
|
+
... pattern=r"acme_[a-zA-Z0-9]{32}",
|
|
563
|
+
... severity="high"
|
|
564
|
+
... )
|
|
565
|
+
|
|
566
|
+
"""
|
|
567
|
+
try:
|
|
568
|
+
compiled_pattern = re.compile(pattern, re.MULTILINE)
|
|
569
|
+
severity_enum = Severity[severity.upper()]
|
|
570
|
+
|
|
571
|
+
self._custom_patterns[name] = (compiled_pattern, severity_enum)
|
|
572
|
+
|
|
573
|
+
logger.info(
|
|
574
|
+
"custom_pattern_added",
|
|
575
|
+
name=name,
|
|
576
|
+
severity=severity,
|
|
577
|
+
)
|
|
578
|
+
|
|
579
|
+
except re.error as e:
|
|
580
|
+
logger.error("invalid_regex_pattern", name=name, error=str(e))
|
|
581
|
+
raise ValueError(f"Invalid regex pattern '{pattern}': {e}") from e
|
|
582
|
+
except KeyError as e:
|
|
583
|
+
logger.error("invalid_severity", severity=severity)
|
|
584
|
+
raise ValueError(
|
|
585
|
+
f"Invalid severity '{severity}'. Must be: critical, high, medium, low",
|
|
586
|
+
) from e
|
|
587
|
+
|
|
588
|
+
def remove_custom_pattern(self, name: str) -> bool:
|
|
589
|
+
"""Remove a custom pattern.
|
|
590
|
+
|
|
591
|
+
Args:
|
|
592
|
+
name: Name of pattern to remove
|
|
593
|
+
|
|
594
|
+
Returns:
|
|
595
|
+
True if removed, False if not found
|
|
596
|
+
|
|
597
|
+
"""
|
|
598
|
+
if name in self._custom_patterns:
|
|
599
|
+
del self._custom_patterns[name]
|
|
600
|
+
logger.info("custom_pattern_removed", name=name)
|
|
601
|
+
return True
|
|
602
|
+
|
|
603
|
+
logger.warning("custom_pattern_not_found", name=name)
|
|
604
|
+
return False
|
|
605
|
+
|
|
606
|
+
def get_statistics(self) -> dict:
|
|
607
|
+
"""Get detector statistics.
|
|
608
|
+
|
|
609
|
+
Returns:
|
|
610
|
+
Dictionary with pattern counts and configuration
|
|
611
|
+
|
|
612
|
+
"""
|
|
613
|
+
return {
|
|
614
|
+
"builtin_patterns": len(self._patterns),
|
|
615
|
+
"custom_patterns": len(self._custom_patterns),
|
|
616
|
+
"total_patterns": len(self._patterns) + len(self._custom_patterns),
|
|
617
|
+
"entropy_analysis_enabled": self.enable_entropy_analysis,
|
|
618
|
+
"entropy_threshold": self.entropy_threshold,
|
|
619
|
+
"min_entropy_length": self.min_entropy_length,
|
|
620
|
+
}
|
|
621
|
+
|
|
622
|
+
|
|
623
|
+
# Convenience function for quick detection
|
|
624
|
+
def detect_secrets(content: str, **kwargs) -> list[SecretDetection]:
|
|
625
|
+
"""Convenience function to detect secrets without creating a detector instance.
|
|
626
|
+
|
|
627
|
+
Args:
|
|
628
|
+
content: Text content to scan
|
|
629
|
+
**kwargs: Additional arguments for SecretsDetector
|
|
630
|
+
|
|
631
|
+
Returns:
|
|
632
|
+
List of SecretDetection objects
|
|
633
|
+
|
|
634
|
+
Example:
|
|
635
|
+
>>> detections = detect_secrets(code_content)
|
|
636
|
+
>>> if detections:
|
|
637
|
+
... print(f"Found {len(detections)} secrets!")
|
|
638
|
+
|
|
639
|
+
"""
|
|
640
|
+
detector = SecretsDetector(**kwargs)
|
|
641
|
+
return detector.detect(content)
|
|
642
|
+
|
|
643
|
+
|
|
644
|
+
# Example usage
|
|
645
|
+
if __name__ == "__main__":
|
|
646
|
+
# Example 1: Basic detection
|
|
647
|
+
sample_code = """
|
|
648
|
+
# Configuration file
|
|
649
|
+
ANTHROPIC_API_KEY = "sk-ant-api03-abc123xyz789..."
|
|
650
|
+
OPENAI_API_KEY = "sk-proj-abc123xyz789..."
|
|
651
|
+
AWS_ACCESS_KEY_ID = "AKIAIOSFODNN7EXAMPLE"
|
|
652
|
+
|
|
653
|
+
password = "my_secret_password123"
|
|
654
|
+
|
|
655
|
+
# Database connection
|
|
656
|
+
DATABASE_URL = "postgres://user:password@localhost:5432/db"
|
|
657
|
+
"""
|
|
658
|
+
|
|
659
|
+
detector = SecretsDetector()
|
|
660
|
+
detections = detector.detect(sample_code)
|
|
661
|
+
|
|
662
|
+
print(f"Found {len(detections)} secrets:")
|
|
663
|
+
for detection in detections:
|
|
664
|
+
print(f" - {detection.secret_type.value}")
|
|
665
|
+
print(f" Severity: {detection.severity.value}")
|
|
666
|
+
print(f" Location: Line {detection.line_number}, Col {detection.column_start}")
|
|
667
|
+
print(f" Context: {detection.context_snippet}")
|
|
668
|
+
print()
|
|
669
|
+
|
|
670
|
+
# Example 2: Custom pattern
|
|
671
|
+
detector.add_custom_pattern(
|
|
672
|
+
name="acme_api_key",
|
|
673
|
+
pattern=r"acme_[a-zA-Z0-9]{32}",
|
|
674
|
+
severity="high",
|
|
675
|
+
)
|
|
676
|
+
|
|
677
|
+
# Example 3: Statistics
|
|
678
|
+
print("Detector statistics:", detector.get_statistics())
|