raxe 0.4.6__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- raxe/__init__.py +101 -0
- raxe/application/__init__.py +48 -0
- raxe/application/ab_testing.py +170 -0
- raxe/application/analytics/__init__.py +30 -0
- raxe/application/analytics/achievement_service.py +444 -0
- raxe/application/analytics/repositories.py +172 -0
- raxe/application/analytics/retention_service.py +267 -0
- raxe/application/analytics/statistics_service.py +419 -0
- raxe/application/analytics/streak_service.py +283 -0
- raxe/application/apply_policy.py +291 -0
- raxe/application/eager_l2.py +503 -0
- raxe/application/preloader.py +353 -0
- raxe/application/scan_merger.py +321 -0
- raxe/application/scan_pipeline.py +1059 -0
- raxe/application/scan_pipeline_async.py +403 -0
- raxe/application/session_tracker.py +458 -0
- raxe/application/telemetry_manager.py +357 -0
- raxe/application/telemetry_orchestrator.py +1210 -0
- raxe/async_sdk/__init__.py +34 -0
- raxe/async_sdk/cache.py +286 -0
- raxe/async_sdk/client.py +556 -0
- raxe/async_sdk/wrappers/__init__.py +23 -0
- raxe/async_sdk/wrappers/openai.py +238 -0
- raxe/cli/__init__.py +21 -0
- raxe/cli/auth.py +1047 -0
- raxe/cli/branding.py +235 -0
- raxe/cli/config.py +334 -0
- raxe/cli/custom_rules.py +458 -0
- raxe/cli/doctor.py +686 -0
- raxe/cli/error_handler.py +665 -0
- raxe/cli/event.py +648 -0
- raxe/cli/exit_codes.py +57 -0
- raxe/cli/expiry_warning.py +302 -0
- raxe/cli/export.py +183 -0
- raxe/cli/history.py +247 -0
- raxe/cli/l2_formatter.py +872 -0
- raxe/cli/main.py +1137 -0
- raxe/cli/models.py +590 -0
- raxe/cli/output.py +403 -0
- raxe/cli/privacy.py +84 -0
- raxe/cli/profiler.py +262 -0
- raxe/cli/progress.py +379 -0
- raxe/cli/progress_context.py +101 -0
- raxe/cli/repl.py +394 -0
- raxe/cli/rules.py +542 -0
- raxe/cli/setup_wizard.py +721 -0
- raxe/cli/stats.py +292 -0
- raxe/cli/suppress.py +501 -0
- raxe/cli/telemetry.py +1384 -0
- raxe/cli/test.py +130 -0
- raxe/cli/tune.py +315 -0
- raxe/cli/validate.py +218 -0
- raxe/domain/__init__.py +30 -0
- raxe/domain/analytics/__init__.py +97 -0
- raxe/domain/analytics/achievements.py +306 -0
- raxe/domain/analytics/models.py +120 -0
- raxe/domain/analytics/retention.py +168 -0
- raxe/domain/analytics/statistics.py +207 -0
- raxe/domain/analytics/streaks.py +173 -0
- raxe/domain/engine/__init__.py +15 -0
- raxe/domain/engine/executor.py +396 -0
- raxe/domain/engine/matcher.py +212 -0
- raxe/domain/inline_suppression.py +176 -0
- raxe/domain/ml/__init__.py +133 -0
- raxe/domain/ml/embedding_cache.py +309 -0
- raxe/domain/ml/gemma_detector.py +921 -0
- raxe/domain/ml/gemma_models.py +346 -0
- raxe/domain/ml/l2_config.py +428 -0
- raxe/domain/ml/l2_output_schema.py +443 -0
- raxe/domain/ml/manifest_loader.py +309 -0
- raxe/domain/ml/manifest_schema.py +345 -0
- raxe/domain/ml/model_metadata.py +263 -0
- raxe/domain/ml/model_registry.py +786 -0
- raxe/domain/ml/protocol.py +282 -0
- raxe/domain/ml/scoring_models.py +419 -0
- raxe/domain/ml/stub_detector.py +397 -0
- raxe/domain/ml/threat_scorer.py +757 -0
- raxe/domain/ml/tokenizer_registry.py +372 -0
- raxe/domain/ml/voting/__init__.py +89 -0
- raxe/domain/ml/voting/config.py +595 -0
- raxe/domain/ml/voting/engine.py +465 -0
- raxe/domain/ml/voting/head_voters.py +378 -0
- raxe/domain/ml/voting/models.py +222 -0
- raxe/domain/models.py +82 -0
- raxe/domain/packs/__init__.py +17 -0
- raxe/domain/packs/models.py +304 -0
- raxe/domain/policies/__init__.py +20 -0
- raxe/domain/policies/evaluator.py +212 -0
- raxe/domain/policies/models.py +223 -0
- raxe/domain/rules/__init__.py +32 -0
- raxe/domain/rules/custom.py +286 -0
- raxe/domain/rules/models.py +273 -0
- raxe/domain/rules/schema.py +166 -0
- raxe/domain/rules/validator.py +556 -0
- raxe/domain/suppression.py +801 -0
- raxe/domain/suppression_factory.py +174 -0
- raxe/domain/telemetry/__init__.py +116 -0
- raxe/domain/telemetry/backpressure.py +424 -0
- raxe/domain/telemetry/event_creator.py +362 -0
- raxe/domain/telemetry/events.py +1282 -0
- raxe/domain/telemetry/priority.py +263 -0
- raxe/domain/telemetry/scan_telemetry_builder.py +670 -0
- raxe/infrastructure/__init__.py +25 -0
- raxe/infrastructure/analytics/__init__.py +18 -0
- raxe/infrastructure/analytics/aggregator.py +484 -0
- raxe/infrastructure/analytics/aggregator_optimized.py +184 -0
- raxe/infrastructure/analytics/engine.py +748 -0
- raxe/infrastructure/analytics/repository.py +409 -0
- raxe/infrastructure/analytics/streaks.py +467 -0
- raxe/infrastructure/analytics/views.py +178 -0
- raxe/infrastructure/cloud/__init__.py +9 -0
- raxe/infrastructure/config/__init__.py +56 -0
- raxe/infrastructure/config/endpoints.py +641 -0
- raxe/infrastructure/config/scan_config.py +352 -0
- raxe/infrastructure/config/yaml_config.py +459 -0
- raxe/infrastructure/database/__init__.py +10 -0
- raxe/infrastructure/database/connection.py +200 -0
- raxe/infrastructure/database/models.py +325 -0
- raxe/infrastructure/database/scan_history.py +764 -0
- raxe/infrastructure/ml/__init__.py +0 -0
- raxe/infrastructure/ml/download_progress.py +438 -0
- raxe/infrastructure/ml/model_downloader.py +457 -0
- raxe/infrastructure/models/__init__.py +16 -0
- raxe/infrastructure/models/discovery.py +461 -0
- raxe/infrastructure/packs/__init__.py +13 -0
- raxe/infrastructure/packs/loader.py +407 -0
- raxe/infrastructure/packs/registry.py +381 -0
- raxe/infrastructure/policies/__init__.py +16 -0
- raxe/infrastructure/policies/api_client.py +256 -0
- raxe/infrastructure/policies/validator.py +227 -0
- raxe/infrastructure/policies/yaml_loader.py +250 -0
- raxe/infrastructure/rules/__init__.py +18 -0
- raxe/infrastructure/rules/custom_loader.py +224 -0
- raxe/infrastructure/rules/versioning.py +222 -0
- raxe/infrastructure/rules/yaml_loader.py +286 -0
- raxe/infrastructure/security/__init__.py +31 -0
- raxe/infrastructure/security/auth.py +145 -0
- raxe/infrastructure/security/policy_validator.py +124 -0
- raxe/infrastructure/security/signatures.py +171 -0
- raxe/infrastructure/suppression/__init__.py +36 -0
- raxe/infrastructure/suppression/composite_repository.py +154 -0
- raxe/infrastructure/suppression/sqlite_repository.py +231 -0
- raxe/infrastructure/suppression/yaml_composite_repository.py +156 -0
- raxe/infrastructure/suppression/yaml_repository.py +510 -0
- raxe/infrastructure/telemetry/__init__.py +79 -0
- raxe/infrastructure/telemetry/acquisition.py +179 -0
- raxe/infrastructure/telemetry/config.py +254 -0
- raxe/infrastructure/telemetry/credential_store.py +947 -0
- raxe/infrastructure/telemetry/dual_queue.py +1123 -0
- raxe/infrastructure/telemetry/flush_helper.py +343 -0
- raxe/infrastructure/telemetry/flush_scheduler.py +776 -0
- raxe/infrastructure/telemetry/health_client.py +394 -0
- raxe/infrastructure/telemetry/hook.py +347 -0
- raxe/infrastructure/telemetry/queue.py +520 -0
- raxe/infrastructure/telemetry/sender.py +476 -0
- raxe/infrastructure/tracking/__init__.py +13 -0
- raxe/infrastructure/tracking/usage.py +389 -0
- raxe/integrations/__init__.py +55 -0
- raxe/integrations/availability.py +143 -0
- raxe/integrations/registry.py +122 -0
- raxe/integrations/utils.py +135 -0
- raxe/mcp/__init__.py +62 -0
- raxe/mcp/cli.py +97 -0
- raxe/mcp/server.py +409 -0
- raxe/monitoring/__init__.py +51 -0
- raxe/monitoring/metrics.py +372 -0
- raxe/monitoring/profiler.py +388 -0
- raxe/monitoring/server.py +136 -0
- raxe/packs/core/v1.0.0/pack.yaml +1394 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-001@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-006@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-014@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-017@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-022@1.0.0.yaml +67 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-023@1.0.0.yaml +91 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-024@1.0.0.yaml +80 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-025@1.0.0.yaml +81 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-026@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-027@1.0.0.yaml +77 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-028@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-029@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-030@1.0.0.yaml +55 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-033@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-034@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-035@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-046@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-047@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-048@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-049@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-050@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-068@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-078@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-2001@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-2004@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-201@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-202@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-203@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3007@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3016@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3026@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3027@1.0.0.yaml +64 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3028@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3029@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3030@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3031@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3032@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3033@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3034@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-79@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-80@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-81@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-82@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-83@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-84@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-85@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-86@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-87@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-88@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-89@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-90@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-91@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-92@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-93@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-94@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-95@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-96@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-97@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-98@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-007@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-015@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-016@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-017@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-021@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-022@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-023@1.0.0.yaml +78 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-024@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-025@1.0.0.yaml +93 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-026@1.0.0.yaml +81 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-027@1.0.0.yaml +82 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-028@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-033@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-036@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-037@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-052@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-054@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-056@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-065@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-075@1.0.0.yaml +45 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-079@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1080@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1090@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1104@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1105@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1112@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-201@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-202@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-203@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-204@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-205@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-206@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-207@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-208@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-209@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-210@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-211@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-212@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-213@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-214@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-215@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-216@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-217@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-218@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-219@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-220@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-221@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-222@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-223@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-224@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-225@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-226@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-227@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-228@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-229@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-230@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-231@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-232@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-233@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-234@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-235@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-236@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-237@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-238@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-013@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-019@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-020@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-024@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-029@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-038@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-044@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-067@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-069@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-100@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-101@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-102@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-103@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-104@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-105@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-106@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-107@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-108@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-109@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-110@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-111@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-112@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-113@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-114@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-115@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-116@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-117@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-118@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-119@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-120@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-201@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-203@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3004@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3006@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3011@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-5016@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-6001@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-6002@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-70@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-71@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-72@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-73@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-74@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-75@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-76@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-77@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-78@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-79@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-80@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-81@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-82@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-83@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-84@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-85@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-86@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-87@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-88@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-89@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-90@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-91@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-92@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-93@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-94@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-95@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-96@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-97@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-98@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-99@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-001@1.0.0.yaml +73 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-002@1.0.0.yaml +71 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-003@1.0.0.yaml +65 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-004@1.0.0.yaml +73 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-101@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-102@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-103@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-104@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-105@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-106@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-107@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-108@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-109@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-110@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-111@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-112@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-113@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-114@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-115@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-116@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-117@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-118@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-119@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-120@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-121@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-122@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-123@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-124@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-125@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-126@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-127@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-128@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-129@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-130@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-131@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-132@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-133@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-134@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-135@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-136@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-137@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-138@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-139@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-140@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-141@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-142@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-143@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-144@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-145@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-146@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-147@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-148@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-149@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-150@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-151@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-152@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-153@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-154@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-155@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-156@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-157@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-158@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-159@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-160@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-161@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-001@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-009@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-020@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-021@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-022@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-028@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-033@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-034@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-036@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-039@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-056@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-066@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-076@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-098@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-103@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-104@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-105@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-110@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-111@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-112@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-113@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-114@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-115@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-116@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-117@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-118@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-119@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-120@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-121@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-122@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-123@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-124@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-125@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-126@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-127@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-128@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-129@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-130@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-131@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-132@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-133@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-134@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-135@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-136@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-137@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-138@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-139@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-140@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-141@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-142@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-143@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-144@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-145@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-146@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-147@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-148@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-149@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-150@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-151@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-152@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-153@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-154@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-155@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-156@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-157@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-158@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-159@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-160@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-161@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-162@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-201@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-203@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-204@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-205@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-206@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-207@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-009@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-012@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-017@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-022@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-025@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-027@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-028@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-034@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-037@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-040@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-041@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-044@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-050@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-051@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-052@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-053@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-054@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-055@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-056@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-058@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2015@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2025@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2026@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2035@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2037@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2042@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3001@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3002@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3003@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3004@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3005@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3006@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3007@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3008@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3009@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3010@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3011@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3012@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3013@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3014@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3015@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3016@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3017@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3018@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3019@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3020@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3021@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3022@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3023@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3024@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3025@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3026@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3027@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3028@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3029@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3030@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3031@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3032@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3033@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3034@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3035@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3036@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3037@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3038@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3039@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3040@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3041@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3042@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3043@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3044@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3045@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3046@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3047@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3048@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3049@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3050@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3051@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3052@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3053@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3054@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3055@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3056@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3057@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3058@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3059@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3060@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3061@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3062@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3063@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3064@1.0.0.yaml +78 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3065@1.0.0.yaml +84 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3066@1.0.0.yaml +84 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3067@1.0.0.yaml +88 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3068@1.0.0.yaml +94 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3069@1.0.0.yaml +90 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3070@1.0.0.yaml +99 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3071@1.0.0.yaml +91 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3072@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3073@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3074@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3075@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3076@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3077@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3078@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3079@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3080@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3081@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3082@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3083@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3084@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3085@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-016@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-028@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-042@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-044@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-045@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-050@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-201@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3001@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3006@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3009@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3012@1.0.0.yaml +41 -0
- raxe/plugins/__init__.py +98 -0
- raxe/plugins/custom_rules.py +380 -0
- raxe/plugins/loader.py +389 -0
- raxe/plugins/manager.py +538 -0
- raxe/plugins/protocol.py +428 -0
- raxe/py.typed +0 -0
- raxe/sdk/__init__.py +77 -0
- raxe/sdk/agent_scanner.py +1918 -0
- raxe/sdk/client.py +1603 -0
- raxe/sdk/decorator.py +175 -0
- raxe/sdk/exceptions.py +859 -0
- raxe/sdk/integrations/__init__.py +277 -0
- raxe/sdk/integrations/agent_scanner.py +71 -0
- raxe/sdk/integrations/autogen.py +872 -0
- raxe/sdk/integrations/crewai.py +1368 -0
- raxe/sdk/integrations/dspy.py +845 -0
- raxe/sdk/integrations/extractors.py +363 -0
- raxe/sdk/integrations/huggingface.py +395 -0
- raxe/sdk/integrations/langchain.py +948 -0
- raxe/sdk/integrations/litellm.py +484 -0
- raxe/sdk/integrations/llamaindex.py +1049 -0
- raxe/sdk/integrations/portkey.py +831 -0
- raxe/sdk/suppression_context.py +215 -0
- raxe/sdk/wrappers/__init__.py +163 -0
- raxe/sdk/wrappers/anthropic.py +310 -0
- raxe/sdk/wrappers/openai.py +221 -0
- raxe/sdk/wrappers/vertexai.py +484 -0
- raxe/utils/__init__.py +12 -0
- raxe/utils/error_sanitizer.py +135 -0
- raxe/utils/logging.py +241 -0
- raxe/utils/performance.py +414 -0
- raxe/utils/profiler.py +339 -0
- raxe/utils/validators.py +170 -0
- raxe-0.4.6.dist-info/METADATA +471 -0
- raxe-0.4.6.dist-info/RECORD +668 -0
- raxe-0.4.6.dist-info/WHEEL +5 -0
- raxe-0.4.6.dist-info/entry_points.txt +2 -0
- raxe-0.4.6.dist-info/licenses/LICENSE +56 -0
- raxe-0.4.6.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3006
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Anthropic API Key Detection
|
|
6
|
+
description: Detects Anthropic Claude API keys (sk-ant- pattern)
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.99
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(sk-ant-[A-Za-z0-9\-_]{95,})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "ANTHROPIC_API_KEY=sk-ant-api03-1234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890abcdefghijklmnop"
|
|
16
|
+
- "claude_key: sk-ant-sid01-AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "Anthropic keys start with sk-ant-"
|
|
19
|
+
- "How to get a Claude API key?"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: ai_credentials
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
34
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3006-Anthropic-Api-Key-Detection
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3007
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: GitHub Personal Access Token Detection
|
|
6
|
+
description: Detects GitHub personal access tokens (ghp_, gho_, ghu_, ghs_, ghr_ patterns)
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.98
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(gh[pousr]_[A-Za-z0-9]{36,})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "GITHUB_TOKEN=ghp_1234567890abcdefghijklmnopqrstuvwxyzABCD"
|
|
16
|
+
- "oauth_token: gho_AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
|
|
17
|
+
- "user_token=ghu_abcdefghijklmnopqrstuvwxyz1234567890ABCD"
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "GitHub tokens start with ghp_"
|
|
20
|
+
- "How to create a GitHub PAT?"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.001
|
|
28
|
+
- T1528
|
|
29
|
+
metadata:
|
|
30
|
+
created: '2025-11-16'
|
|
31
|
+
updated: '2025-11-16'
|
|
32
|
+
author: raxe-ce
|
|
33
|
+
category: vcs_credentials
|
|
34
|
+
rule_hash: null
|
|
35
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
36
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
37
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3007-Github-Personal-Access-Token
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3008
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Slack Bot Token Detection
|
|
6
|
+
description: Detects Slack bot and workspace tokens (xoxb-, xoxp-, xoxa-, xoxr- patterns)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(xox[bpra]-[0-9]{10,13}-[0-9]{10,13}-[A-Za-z0-9]{24,})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "SLACK_BOT_TOKEN=xoxb-1234567890123-1234567890123-abcdefghijklmnopqrstuvwx"
|
|
16
|
+
- "token: xoxp-1234567890-1234567890-1234567890-abc123def456ghi789jkl012mno345pqr"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "Slack tokens start with xox"
|
|
19
|
+
- "How to get a Slack bot token?"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: collaboration_credentials
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
34
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3008-Slack-Bot-Token-Detection
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3009
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Stripe API Key Detection
|
|
6
|
+
description: Detects Stripe API keys (sk_live_, pk_live_, sk_test_, pk_test_ patterns)
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.99
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(sk_live_[0-9a-zA-Z]{24,})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: \b(pk_live_[0-9a-zA-Z]{24,})\b
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
- pattern: \b(sk_test_[0-9a-zA-Z]{24,})\b
|
|
17
|
+
flags: []
|
|
18
|
+
timeout: 5.0
|
|
19
|
+
examples:
|
|
20
|
+
should_match:
|
|
21
|
+
- "STRIPE_SECRET_KEY=sk_live_1234567890abcdefghijklmnopqrstuvwxyz"
|
|
22
|
+
- "publishable_key: pk_live_AAAAAAAAAAAAAAAAAAAAAAAAAAAA"
|
|
23
|
+
- "test_key=sk_test_abcdefghijklmnopqrstuvwxyz1234567890"
|
|
24
|
+
should_not_match:
|
|
25
|
+
- "Stripe keys start with sk_live_ or pk_live_"
|
|
26
|
+
- "How to get Stripe API keys?"
|
|
27
|
+
metrics:
|
|
28
|
+
precision: null
|
|
29
|
+
recall: null
|
|
30
|
+
f1_score: null
|
|
31
|
+
last_evaluated: null
|
|
32
|
+
mitre_attack:
|
|
33
|
+
- T1552.001
|
|
34
|
+
metadata:
|
|
35
|
+
created: '2025-11-16'
|
|
36
|
+
updated: '2025-11-16'
|
|
37
|
+
author: raxe-ce
|
|
38
|
+
category: payment_credentials
|
|
39
|
+
rule_hash: null
|
|
40
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
41
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
42
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3009-Stripe-Api-Key-Detection
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3010
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Twilio API Key Detection
|
|
6
|
+
description: Detects Twilio account SID and auth tokens
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.96
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(AC[a-f0-9]{32})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: (?i)twilio.{0,20}(?:auth|token).{0,20}['\"]([a-f0-9]{32})['\"]
|
|
14
|
+
flags:
|
|
15
|
+
- IGNORECASE
|
|
16
|
+
timeout: 5.0
|
|
17
|
+
examples:
|
|
18
|
+
should_match:
|
|
19
|
+
- "TWILIO_ACCOUNT_SID=ACabcdef1234567890abcdef1234567890"
|
|
20
|
+
- "twilio_auth_token='1234567890abcdef1234567890abcdef'"
|
|
21
|
+
should_not_match:
|
|
22
|
+
- "Twilio SIDs start with AC"
|
|
23
|
+
- "How to find my Twilio credentials?"
|
|
24
|
+
metrics:
|
|
25
|
+
precision: null
|
|
26
|
+
recall: null
|
|
27
|
+
f1_score: null
|
|
28
|
+
last_evaluated: null
|
|
29
|
+
mitre_attack:
|
|
30
|
+
- T1552.001
|
|
31
|
+
metadata:
|
|
32
|
+
created: '2025-11-16'
|
|
33
|
+
updated: '2025-11-16'
|
|
34
|
+
author: raxe-ce
|
|
35
|
+
category: communication_credentials
|
|
36
|
+
rule_hash: null
|
|
37
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
38
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
39
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3010-Twilio-Api-Key-Detection
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3011
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: SendGrid API Key Detection
|
|
6
|
+
description: Detects SendGrid API keys (SG. pattern)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(SG\.[A-Za-z0-9\-_]{22}\.[A-Za-z0-9\-_]{43})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "SENDGRID_API_KEY=SG.abcdefghijklmnopqrstuv.1234567890abcdefghijklmnopqrstuvwxyzABCDEFG"
|
|
16
|
+
- "api_key: SG.AAAAAAAAAAAAAAAAAAAAAA.BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "SendGrid keys start with SG."
|
|
19
|
+
- "How to create a SendGrid API key?"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: email_credentials
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
34
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3011-Sendgrid-Api-Key-Detection
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3012
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Mailgun API Key Detection
|
|
6
|
+
description: Detects Mailgun API keys (key- pattern)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.95
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(key-[a-f0-9]{32})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "MAILGUN_API_KEY=key-1234567890abcdef1234567890abcdef"
|
|
16
|
+
- "mailgun_key: key-abcdef1234567890abcdef1234567890"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "Mailgun keys start with key-"
|
|
19
|
+
- "How to get a Mailgun API key?"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: email_credentials
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
34
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3012-Mailgun-Api-Key-Detection
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3013
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Datadog API Key Detection
|
|
6
|
+
description: Detects Datadog API keys (32-character hex strings in context)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.93
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)datadog.{0,20}(?:api|app).{0,20}key.{0,20}['\"]([a-f0-9]{32})['\"]
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "DATADOG_API_KEY='1234567890abcdef1234567890abcdef'"
|
|
17
|
+
- "dd_app_key: 'abcdef1234567890abcdef1234567890'"
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "Datadog API keys are 32 characters"
|
|
20
|
+
- "How to find my Datadog key?"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.001
|
|
28
|
+
metadata:
|
|
29
|
+
created: '2025-11-16'
|
|
30
|
+
updated: '2025-11-16'
|
|
31
|
+
author: raxe-ce
|
|
32
|
+
category: monitoring_credentials
|
|
33
|
+
rule_hash: null
|
|
34
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
35
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
36
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3013-Datadog-Api-Key-Detection
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3014
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Heroku API Key Detection
|
|
6
|
+
description: Detects Heroku API keys (UUID format in context)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.94
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)heroku.{0,20}(?:api|token|key).{0,20}['\"]([a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12})['\"]
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "HEROKU_API_KEY='12345678-1234-1234-1234-123456789abc'"
|
|
17
|
+
- "heroku_token: 'abcdef12-3456-7890-abcd-ef1234567890'"
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "Heroku uses UUID format for API keys"
|
|
20
|
+
- "How to get a Heroku API key?"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.001
|
|
28
|
+
metadata:
|
|
29
|
+
created: '2025-11-16'
|
|
30
|
+
updated: '2025-11-16'
|
|
31
|
+
author: raxe-ce
|
|
32
|
+
category: platform_credentials
|
|
33
|
+
rule_hash: null
|
|
34
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
35
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
36
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3014-Heroku-Api-Key-Detection
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3015
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: identity_documents
|
|
5
|
+
name: US Passport Number Detection
|
|
6
|
+
description: Detects US passport numbers (9 digits or 1-2 letters + 8 digits)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.92
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:passport|pass\.?\s*(?:no|number|num|#)).{0,20}\b([A-Z]{1,2}[0-9]{8})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:passport|pass\.?\s*(?:no|number|num|#)).{0,20}\b([0-9]{9})\b
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "My passport number is A12345678"
|
|
21
|
+
- "Passport No: 123456789"
|
|
22
|
+
- "Pass #: AB12345678"
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "What is a passport number?"
|
|
25
|
+
- "US passports have 9 digits"
|
|
26
|
+
- "I need to renew my passport"
|
|
27
|
+
metrics:
|
|
28
|
+
precision: null
|
|
29
|
+
recall: null
|
|
30
|
+
f1_score: null
|
|
31
|
+
last_evaluated: null
|
|
32
|
+
mitre_attack:
|
|
33
|
+
- T1552.004
|
|
34
|
+
metadata:
|
|
35
|
+
created: '2025-11-16'
|
|
36
|
+
updated: '2025-11-16'
|
|
37
|
+
author: raxe-ce
|
|
38
|
+
category: identity_documents
|
|
39
|
+
rule_hash: null
|
|
40
|
+
risk_explanation: Identity document numbers (passports, driver licenses, national ID numbers) enable identity theft and fraud when exposed. Attackers can use these credentials to impersonate victims, open fraudulent accounts, or bypass authentication systems.
|
|
41
|
+
remediation_advice: Implement strict access controls for identity document data. Use tokenization or anonymization when processing identity information. Deploy DLP controls that detect and block identity document leakage. Maintain audit logs of all access to identity data.
|
|
42
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3015-Us-Passport-Number-Detection
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3016
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: identity_documents
|
|
5
|
+
name: US Driver License Number Detection
|
|
6
|
+
description: Detects US driver license numbers in various state formats
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.88
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:driver.{0,5}license|DL|drivers?\s*lic).{0,20}(?:no|number|num|#).{0,10}\b([A-Z]{1,2}[0-9]{6,8})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:driver.{0,5}license|DL|drivers?\s*lic).{0,20}(?:no|number|num|#).{0,10}\b([0-9]{7,9})\b
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "Driver License No: A1234567"
|
|
21
|
+
- "DL#: 12345678"
|
|
22
|
+
- "Drivers Lic Number: B12345678"
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "What is a driver license number?"
|
|
25
|
+
- "How to get a DL?"
|
|
26
|
+
- "Driver license requirements"
|
|
27
|
+
metrics:
|
|
28
|
+
precision: null
|
|
29
|
+
recall: null
|
|
30
|
+
f1_score: null
|
|
31
|
+
last_evaluated: null
|
|
32
|
+
mitre_attack:
|
|
33
|
+
- T1552.004
|
|
34
|
+
metadata:
|
|
35
|
+
created: '2025-11-16'
|
|
36
|
+
updated: '2025-11-16'
|
|
37
|
+
author: raxe-ce
|
|
38
|
+
category: identity_documents
|
|
39
|
+
rule_hash: null
|
|
40
|
+
risk_explanation: Identity document numbers (passports, driver licenses, national ID numbers) enable identity theft and fraud when exposed. Attackers can use these credentials to impersonate victims, open fraudulent accounts, or bypass authentication systems.
|
|
41
|
+
remediation_advice: Implement strict access controls for identity document data. Use tokenization or anonymization when processing identity information. Deploy DLP controls that detect and block identity document leakage. Maintain audit logs of all access to identity data.
|
|
42
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3016-Us-Driver-License-Number
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3017
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: identity_documents
|
|
5
|
+
name: UK National Insurance Number Detection
|
|
6
|
+
description: Detects UK National Insurance Numbers (NINO) in format XX123456X
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.94
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:national\s*insurance|NI|NINO).{0,20}(?:no|number|num).{0,10}\b([A-Z]{2}[0-9]{6}[A-Z])\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: \b([A-Z]{2}\s*[0-9]{2}\s*[0-9]{2}\s*[0-9]{2}\s*[A-Z])\b
|
|
15
|
+
flags: []
|
|
16
|
+
timeout: 5.0
|
|
17
|
+
examples:
|
|
18
|
+
should_match:
|
|
19
|
+
- "National Insurance Number: AB123456C"
|
|
20
|
+
- "NINO: QQ 12 34 56 C"
|
|
21
|
+
- "NI No: AB123456D"
|
|
22
|
+
should_not_match:
|
|
23
|
+
- "What is a National Insurance Number?"
|
|
24
|
+
- "How to apply for NINO?"
|
|
25
|
+
metrics:
|
|
26
|
+
precision: null
|
|
27
|
+
recall: null
|
|
28
|
+
f1_score: null
|
|
29
|
+
last_evaluated: null
|
|
30
|
+
mitre_attack:
|
|
31
|
+
- T1552.004
|
|
32
|
+
metadata:
|
|
33
|
+
created: '2025-11-16'
|
|
34
|
+
updated: '2025-11-16'
|
|
35
|
+
author: raxe-ce
|
|
36
|
+
category: identity_documents
|
|
37
|
+
rule_hash: null
|
|
38
|
+
risk_explanation: Identity document numbers (passports, driver licenses, national ID numbers) enable identity theft and fraud when exposed. Attackers can use these credentials to impersonate victims, open fraudulent accounts, or bypass authentication systems.
|
|
39
|
+
remediation_advice: Implement strict access controls for identity document data. Use tokenization or anonymization when processing identity information. Deploy DLP controls that detect and block identity document leakage. Maintain audit logs of all access to identity data.
|
|
40
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3017-Uk-National-Insurance-Number
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3018
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: identity_documents
|
|
5
|
+
name: Canadian Social Insurance Number Detection
|
|
6
|
+
description: Detects Canadian Social Insurance Numbers (SIN) in format XXX-XXX-XXX
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.93
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:social\s*insurance|SIN).{0,20}(?:no|number|num).{0,10}\b([0-9]{3}[-\s]?[0-9]{3}[-\s]?[0-9]{3})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "Social Insurance Number: 123-456-789"
|
|
17
|
+
- "SIN: 123 456 789"
|
|
18
|
+
- "SIN No: 123456789"
|
|
19
|
+
should_not_match:
|
|
20
|
+
- "What is a SIN?"
|
|
21
|
+
- "How to get a Social Insurance Number?"
|
|
22
|
+
- "My phone is 123-456-7890"
|
|
23
|
+
metrics:
|
|
24
|
+
precision: null
|
|
25
|
+
recall: null
|
|
26
|
+
f1_score: null
|
|
27
|
+
last_evaluated: null
|
|
28
|
+
mitre_attack:
|
|
29
|
+
- T1552.004
|
|
30
|
+
metadata:
|
|
31
|
+
created: '2025-11-16'
|
|
32
|
+
updated: '2025-11-16'
|
|
33
|
+
author: raxe-ce
|
|
34
|
+
category: identity_documents
|
|
35
|
+
rule_hash: null
|
|
36
|
+
risk_explanation: Identity document numbers (passports, driver licenses, national ID numbers) enable identity theft and fraud when exposed. Attackers can use these credentials to impersonate victims, open fraudulent accounts, or bypass authentication systems.
|
|
37
|
+
remediation_advice: Implement strict access controls for identity document data. Use tokenization or anonymization when processing identity information. Deploy DLP controls that detect and block identity document leakage. Maintain audit logs of all access to identity data.
|
|
38
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3018-Canadian-Social-Insurance-Number
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3019
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: financial
|
|
5
|
+
name: IBAN Detection
|
|
6
|
+
description: Detects International Bank Account Numbers (IBAN) - European standard
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.95
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b([A-Z]{2}[0-9]{2}[A-Z0-9]{11,30})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: (?i)iban.{0,10}[:\s]+([A-Z]{2}[0-9]{2}[\s]?[A-Z0-9]{4}[\s]?[A-Z0-9]{4}[\s]?[A-Z0-9]{4}[\s]?[A-Z0-9]{0,18})
|
|
14
|
+
flags:
|
|
15
|
+
- IGNORECASE
|
|
16
|
+
timeout: 5.0
|
|
17
|
+
examples:
|
|
18
|
+
should_match:
|
|
19
|
+
- "IBAN: GB82 WEST 1234 5698 7654 32"
|
|
20
|
+
- "Account: DE89370400440532013000"
|
|
21
|
+
- "IBAN FR1420041010050500013M02606"
|
|
22
|
+
should_not_match:
|
|
23
|
+
- "What is an IBAN?"
|
|
24
|
+
- "IBAN format for UK banks"
|
|
25
|
+
metrics:
|
|
26
|
+
precision: null
|
|
27
|
+
recall: null
|
|
28
|
+
f1_score: null
|
|
29
|
+
last_evaluated: null
|
|
30
|
+
mitre_attack:
|
|
31
|
+
- T1552.004
|
|
32
|
+
metadata:
|
|
33
|
+
created: '2025-11-16'
|
|
34
|
+
updated: '2025-11-16'
|
|
35
|
+
author: raxe-ce
|
|
36
|
+
category: financial
|
|
37
|
+
rule_hash: null
|
|
38
|
+
risk_explanation: Financial credential exposure (account numbers, routing numbers, cryptocurrency addresses) enables direct financial fraud and theft. Attackers can initiate unauthorized transactions, drain accounts, or conduct money laundering operations.
|
|
39
|
+
remediation_advice: Apply PCI DSS and financial data security standards. Use encryption and tokenization for financial data. Implement transaction monitoring and fraud detection. Restrict AI access to financial systems and data stores.
|
|
40
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3019-Iban-Detection
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3020
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: financial
|
|
5
|
+
name: SWIFT/BIC Code Detection
|
|
6
|
+
description: Detects SWIFT/BIC codes for international wire transfers
|
|
7
|
+
severity: medium
|
|
8
|
+
confidence: 0.91
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(?:SWIFT|BIC)\b.{0,10}(?:code|no|number)?.{0,10}\b([A-Z]{6}[A-Z0-9]{2}([A-Z0-9]{3})?)\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "SWIFT Code: DEUTDEFF500"
|
|
16
|
+
- "BIC: CHASUS33"
|
|
17
|
+
- "Bank SWIFT: BNPAFRPP"
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "What is a SWIFT code?"
|
|
20
|
+
- "How to find BIC code?"
|
|
21
|
+
- "How do I handle authentication in a Swift application?"
|
|
22
|
+
- "Can you help me debug this Swift function?"
|
|
23
|
+
- "I'm learning Swift programming"
|
|
24
|
+
- "What are Swift best practices?"
|
|
25
|
+
metrics:
|
|
26
|
+
precision: null
|
|
27
|
+
recall: null
|
|
28
|
+
f1_score: null
|
|
29
|
+
last_evaluated: null
|
|
30
|
+
mitre_attack:
|
|
31
|
+
- T1552.004
|
|
32
|
+
metadata:
|
|
33
|
+
created: '2025-11-16'
|
|
34
|
+
updated: '2025-11-20'
|
|
35
|
+
author: raxe-ce
|
|
36
|
+
category: financial
|
|
37
|
+
rule_hash: null
|
|
38
|
+
risk_explanation: Financial credential exposure (account numbers, routing numbers, cryptocurrency addresses) enables direct financial fraud and theft. Attackers can initiate unauthorized transactions, drain accounts, or conduct money laundering operations.
|
|
39
|
+
remediation_advice: Apply PCI DSS and financial data security standards. Use encryption and tokenization for financial data. Implement transaction monitoring and fraud detection. Restrict AI access to financial systems and data stores.
|
|
40
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3020-Swift/Bic-Code-Detection
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3021
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: financial
|
|
5
|
+
name: Bitcoin Wallet Address Detection
|
|
6
|
+
description: Detects Bitcoin (BTC) wallet addresses (P2PKH, P2SH, Bech32 formats)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.96
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(bc1[a-z0-9]{39,59})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: \b([13][a-km-zA-HJ-NP-Z1-9]{25,34})\b
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
examples:
|
|
17
|
+
should_match:
|
|
18
|
+
- "Send BTC to: bc1qar0srrr7xfkvy5l643lydnw9re59gtzzwf5mdq"
|
|
19
|
+
- "Wallet: 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa"
|
|
20
|
+
- "Address: 3J98t1WpEZ73CNmYviecrnyiWrnqRhWNLy"
|
|
21
|
+
should_not_match:
|
|
22
|
+
- "Bitcoin addresses start with 1, 3, or bc1"
|
|
23
|
+
- "How to create a BTC wallet?"
|
|
24
|
+
metrics:
|
|
25
|
+
precision: null
|
|
26
|
+
recall: null
|
|
27
|
+
f1_score: null
|
|
28
|
+
last_evaluated: null
|
|
29
|
+
mitre_attack:
|
|
30
|
+
- T1552.004
|
|
31
|
+
metadata:
|
|
32
|
+
created: '2025-11-16'
|
|
33
|
+
updated: '2025-11-16'
|
|
34
|
+
author: raxe-ce
|
|
35
|
+
category: cryptocurrency
|
|
36
|
+
rule_hash: null
|
|
37
|
+
risk_explanation: Financial credential exposure (account numbers, routing numbers, cryptocurrency addresses) enables direct financial fraud and theft. Attackers can initiate unauthorized transactions, drain accounts, or conduct money laundering operations.
|
|
38
|
+
remediation_advice: Apply PCI DSS and financial data security standards. Use encryption and tokenization for financial data. Implement transaction monitoring and fraud detection. Restrict AI access to financial systems and data stores.
|
|
39
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3021-Bitcoin-Wallet-Address-Detection
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3022
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: financial
|
|
5
|
+
name: Ethereum Wallet Address Detection
|
|
6
|
+
description: Detects Ethereum (ETH) wallet addresses (0x followed by 40 hex characters)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(0x[a-fA-F0-9]{40})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "ETH wallet: 0x742d35Cc6634C0532925a3b844Bc9e7595f0bEb0"
|
|
16
|
+
- "Send to 0x5aAeb6053F3E94C9b9A09f33669435E7Ef1BeAed"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "Ethereum addresses start with 0x"
|
|
19
|
+
- "How to create an ETH wallet?"
|
|
20
|
+
- "0x prefix for hexadecimal"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.004
|
|
28
|
+
metadata:
|
|
29
|
+
created: '2025-11-16'
|
|
30
|
+
updated: '2025-11-16'
|
|
31
|
+
author: raxe-ce
|
|
32
|
+
category: cryptocurrency
|
|
33
|
+
rule_hash: null
|
|
34
|
+
risk_explanation: Financial credential exposure (account numbers, routing numbers, cryptocurrency addresses) enables direct financial fraud and theft. Attackers can initiate unauthorized transactions, drain accounts, or conduct money laundering operations.
|
|
35
|
+
remediation_advice: Apply PCI DSS and financial data security standards. Use encryption and tokenization for financial data. Implement transaction monitoring and fraud detection. Restrict AI access to financial systems and data stores.
|
|
36
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3022-Ethereum-Wallet-Address-Detection
|