raxe 0.4.6__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- raxe/__init__.py +101 -0
- raxe/application/__init__.py +48 -0
- raxe/application/ab_testing.py +170 -0
- raxe/application/analytics/__init__.py +30 -0
- raxe/application/analytics/achievement_service.py +444 -0
- raxe/application/analytics/repositories.py +172 -0
- raxe/application/analytics/retention_service.py +267 -0
- raxe/application/analytics/statistics_service.py +419 -0
- raxe/application/analytics/streak_service.py +283 -0
- raxe/application/apply_policy.py +291 -0
- raxe/application/eager_l2.py +503 -0
- raxe/application/preloader.py +353 -0
- raxe/application/scan_merger.py +321 -0
- raxe/application/scan_pipeline.py +1059 -0
- raxe/application/scan_pipeline_async.py +403 -0
- raxe/application/session_tracker.py +458 -0
- raxe/application/telemetry_manager.py +357 -0
- raxe/application/telemetry_orchestrator.py +1210 -0
- raxe/async_sdk/__init__.py +34 -0
- raxe/async_sdk/cache.py +286 -0
- raxe/async_sdk/client.py +556 -0
- raxe/async_sdk/wrappers/__init__.py +23 -0
- raxe/async_sdk/wrappers/openai.py +238 -0
- raxe/cli/__init__.py +21 -0
- raxe/cli/auth.py +1047 -0
- raxe/cli/branding.py +235 -0
- raxe/cli/config.py +334 -0
- raxe/cli/custom_rules.py +458 -0
- raxe/cli/doctor.py +686 -0
- raxe/cli/error_handler.py +665 -0
- raxe/cli/event.py +648 -0
- raxe/cli/exit_codes.py +57 -0
- raxe/cli/expiry_warning.py +302 -0
- raxe/cli/export.py +183 -0
- raxe/cli/history.py +247 -0
- raxe/cli/l2_formatter.py +872 -0
- raxe/cli/main.py +1137 -0
- raxe/cli/models.py +590 -0
- raxe/cli/output.py +403 -0
- raxe/cli/privacy.py +84 -0
- raxe/cli/profiler.py +262 -0
- raxe/cli/progress.py +379 -0
- raxe/cli/progress_context.py +101 -0
- raxe/cli/repl.py +394 -0
- raxe/cli/rules.py +542 -0
- raxe/cli/setup_wizard.py +721 -0
- raxe/cli/stats.py +292 -0
- raxe/cli/suppress.py +501 -0
- raxe/cli/telemetry.py +1384 -0
- raxe/cli/test.py +130 -0
- raxe/cli/tune.py +315 -0
- raxe/cli/validate.py +218 -0
- raxe/domain/__init__.py +30 -0
- raxe/domain/analytics/__init__.py +97 -0
- raxe/domain/analytics/achievements.py +306 -0
- raxe/domain/analytics/models.py +120 -0
- raxe/domain/analytics/retention.py +168 -0
- raxe/domain/analytics/statistics.py +207 -0
- raxe/domain/analytics/streaks.py +173 -0
- raxe/domain/engine/__init__.py +15 -0
- raxe/domain/engine/executor.py +396 -0
- raxe/domain/engine/matcher.py +212 -0
- raxe/domain/inline_suppression.py +176 -0
- raxe/domain/ml/__init__.py +133 -0
- raxe/domain/ml/embedding_cache.py +309 -0
- raxe/domain/ml/gemma_detector.py +921 -0
- raxe/domain/ml/gemma_models.py +346 -0
- raxe/domain/ml/l2_config.py +428 -0
- raxe/domain/ml/l2_output_schema.py +443 -0
- raxe/domain/ml/manifest_loader.py +309 -0
- raxe/domain/ml/manifest_schema.py +345 -0
- raxe/domain/ml/model_metadata.py +263 -0
- raxe/domain/ml/model_registry.py +786 -0
- raxe/domain/ml/protocol.py +282 -0
- raxe/domain/ml/scoring_models.py +419 -0
- raxe/domain/ml/stub_detector.py +397 -0
- raxe/domain/ml/threat_scorer.py +757 -0
- raxe/domain/ml/tokenizer_registry.py +372 -0
- raxe/domain/ml/voting/__init__.py +89 -0
- raxe/domain/ml/voting/config.py +595 -0
- raxe/domain/ml/voting/engine.py +465 -0
- raxe/domain/ml/voting/head_voters.py +378 -0
- raxe/domain/ml/voting/models.py +222 -0
- raxe/domain/models.py +82 -0
- raxe/domain/packs/__init__.py +17 -0
- raxe/domain/packs/models.py +304 -0
- raxe/domain/policies/__init__.py +20 -0
- raxe/domain/policies/evaluator.py +212 -0
- raxe/domain/policies/models.py +223 -0
- raxe/domain/rules/__init__.py +32 -0
- raxe/domain/rules/custom.py +286 -0
- raxe/domain/rules/models.py +273 -0
- raxe/domain/rules/schema.py +166 -0
- raxe/domain/rules/validator.py +556 -0
- raxe/domain/suppression.py +801 -0
- raxe/domain/suppression_factory.py +174 -0
- raxe/domain/telemetry/__init__.py +116 -0
- raxe/domain/telemetry/backpressure.py +424 -0
- raxe/domain/telemetry/event_creator.py +362 -0
- raxe/domain/telemetry/events.py +1282 -0
- raxe/domain/telemetry/priority.py +263 -0
- raxe/domain/telemetry/scan_telemetry_builder.py +670 -0
- raxe/infrastructure/__init__.py +25 -0
- raxe/infrastructure/analytics/__init__.py +18 -0
- raxe/infrastructure/analytics/aggregator.py +484 -0
- raxe/infrastructure/analytics/aggregator_optimized.py +184 -0
- raxe/infrastructure/analytics/engine.py +748 -0
- raxe/infrastructure/analytics/repository.py +409 -0
- raxe/infrastructure/analytics/streaks.py +467 -0
- raxe/infrastructure/analytics/views.py +178 -0
- raxe/infrastructure/cloud/__init__.py +9 -0
- raxe/infrastructure/config/__init__.py +56 -0
- raxe/infrastructure/config/endpoints.py +641 -0
- raxe/infrastructure/config/scan_config.py +352 -0
- raxe/infrastructure/config/yaml_config.py +459 -0
- raxe/infrastructure/database/__init__.py +10 -0
- raxe/infrastructure/database/connection.py +200 -0
- raxe/infrastructure/database/models.py +325 -0
- raxe/infrastructure/database/scan_history.py +764 -0
- raxe/infrastructure/ml/__init__.py +0 -0
- raxe/infrastructure/ml/download_progress.py +438 -0
- raxe/infrastructure/ml/model_downloader.py +457 -0
- raxe/infrastructure/models/__init__.py +16 -0
- raxe/infrastructure/models/discovery.py +461 -0
- raxe/infrastructure/packs/__init__.py +13 -0
- raxe/infrastructure/packs/loader.py +407 -0
- raxe/infrastructure/packs/registry.py +381 -0
- raxe/infrastructure/policies/__init__.py +16 -0
- raxe/infrastructure/policies/api_client.py +256 -0
- raxe/infrastructure/policies/validator.py +227 -0
- raxe/infrastructure/policies/yaml_loader.py +250 -0
- raxe/infrastructure/rules/__init__.py +18 -0
- raxe/infrastructure/rules/custom_loader.py +224 -0
- raxe/infrastructure/rules/versioning.py +222 -0
- raxe/infrastructure/rules/yaml_loader.py +286 -0
- raxe/infrastructure/security/__init__.py +31 -0
- raxe/infrastructure/security/auth.py +145 -0
- raxe/infrastructure/security/policy_validator.py +124 -0
- raxe/infrastructure/security/signatures.py +171 -0
- raxe/infrastructure/suppression/__init__.py +36 -0
- raxe/infrastructure/suppression/composite_repository.py +154 -0
- raxe/infrastructure/suppression/sqlite_repository.py +231 -0
- raxe/infrastructure/suppression/yaml_composite_repository.py +156 -0
- raxe/infrastructure/suppression/yaml_repository.py +510 -0
- raxe/infrastructure/telemetry/__init__.py +79 -0
- raxe/infrastructure/telemetry/acquisition.py +179 -0
- raxe/infrastructure/telemetry/config.py +254 -0
- raxe/infrastructure/telemetry/credential_store.py +947 -0
- raxe/infrastructure/telemetry/dual_queue.py +1123 -0
- raxe/infrastructure/telemetry/flush_helper.py +343 -0
- raxe/infrastructure/telemetry/flush_scheduler.py +776 -0
- raxe/infrastructure/telemetry/health_client.py +394 -0
- raxe/infrastructure/telemetry/hook.py +347 -0
- raxe/infrastructure/telemetry/queue.py +520 -0
- raxe/infrastructure/telemetry/sender.py +476 -0
- raxe/infrastructure/tracking/__init__.py +13 -0
- raxe/infrastructure/tracking/usage.py +389 -0
- raxe/integrations/__init__.py +55 -0
- raxe/integrations/availability.py +143 -0
- raxe/integrations/registry.py +122 -0
- raxe/integrations/utils.py +135 -0
- raxe/mcp/__init__.py +62 -0
- raxe/mcp/cli.py +97 -0
- raxe/mcp/server.py +409 -0
- raxe/monitoring/__init__.py +51 -0
- raxe/monitoring/metrics.py +372 -0
- raxe/monitoring/profiler.py +388 -0
- raxe/monitoring/server.py +136 -0
- raxe/packs/core/v1.0.0/pack.yaml +1394 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-001@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-006@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-014@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-017@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-022@1.0.0.yaml +67 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-023@1.0.0.yaml +91 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-024@1.0.0.yaml +80 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-025@1.0.0.yaml +81 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-026@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-027@1.0.0.yaml +77 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-028@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-029@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-030@1.0.0.yaml +55 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-033@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-034@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-035@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-046@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-047@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-048@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-049@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-050@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-068@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-078@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-2001@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-2004@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-201@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-202@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-203@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3007@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3016@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3026@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3027@1.0.0.yaml +64 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3028@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3029@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3030@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3031@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3032@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3033@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3034@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-79@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-80@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-81@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-82@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-83@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-84@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-85@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-86@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-87@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-88@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-89@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-90@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-91@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-92@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-93@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-94@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-95@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-96@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-97@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-98@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-007@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-015@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-016@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-017@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-021@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-022@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-023@1.0.0.yaml +78 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-024@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-025@1.0.0.yaml +93 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-026@1.0.0.yaml +81 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-027@1.0.0.yaml +82 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-028@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-033@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-036@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-037@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-052@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-054@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-056@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-065@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-075@1.0.0.yaml +45 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-079@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1080@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1090@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1104@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1105@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1112@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-201@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-202@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-203@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-204@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-205@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-206@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-207@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-208@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-209@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-210@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-211@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-212@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-213@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-214@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-215@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-216@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-217@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-218@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-219@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-220@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-221@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-222@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-223@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-224@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-225@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-226@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-227@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-228@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-229@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-230@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-231@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-232@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-233@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-234@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-235@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-236@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-237@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-238@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-013@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-019@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-020@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-024@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-029@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-038@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-044@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-067@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-069@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-100@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-101@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-102@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-103@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-104@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-105@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-106@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-107@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-108@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-109@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-110@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-111@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-112@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-113@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-114@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-115@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-116@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-117@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-118@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-119@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-120@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-201@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-203@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3004@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3006@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3011@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-5016@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-6001@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-6002@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-70@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-71@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-72@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-73@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-74@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-75@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-76@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-77@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-78@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-79@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-80@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-81@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-82@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-83@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-84@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-85@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-86@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-87@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-88@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-89@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-90@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-91@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-92@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-93@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-94@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-95@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-96@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-97@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-98@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-99@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-001@1.0.0.yaml +73 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-002@1.0.0.yaml +71 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-003@1.0.0.yaml +65 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-004@1.0.0.yaml +73 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-101@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-102@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-103@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-104@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-105@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-106@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-107@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-108@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-109@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-110@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-111@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-112@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-113@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-114@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-115@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-116@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-117@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-118@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-119@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-120@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-121@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-122@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-123@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-124@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-125@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-126@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-127@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-128@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-129@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-130@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-131@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-132@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-133@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-134@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-135@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-136@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-137@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-138@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-139@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-140@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-141@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-142@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-143@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-144@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-145@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-146@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-147@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-148@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-149@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-150@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-151@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-152@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-153@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-154@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-155@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-156@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-157@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-158@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-159@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-160@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-161@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-001@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-009@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-020@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-021@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-022@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-028@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-033@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-034@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-036@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-039@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-056@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-066@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-076@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-098@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-103@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-104@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-105@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-110@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-111@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-112@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-113@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-114@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-115@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-116@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-117@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-118@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-119@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-120@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-121@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-122@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-123@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-124@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-125@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-126@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-127@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-128@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-129@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-130@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-131@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-132@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-133@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-134@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-135@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-136@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-137@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-138@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-139@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-140@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-141@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-142@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-143@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-144@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-145@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-146@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-147@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-148@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-149@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-150@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-151@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-152@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-153@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-154@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-155@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-156@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-157@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-158@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-159@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-160@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-161@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-162@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-201@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-203@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-204@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-205@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-206@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-207@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-009@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-012@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-017@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-022@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-025@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-027@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-028@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-034@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-037@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-040@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-041@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-044@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-050@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-051@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-052@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-053@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-054@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-055@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-056@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-058@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2015@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2025@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2026@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2035@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2037@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2042@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3001@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3002@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3003@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3004@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3005@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3006@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3007@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3008@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3009@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3010@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3011@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3012@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3013@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3014@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3015@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3016@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3017@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3018@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3019@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3020@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3021@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3022@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3023@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3024@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3025@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3026@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3027@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3028@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3029@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3030@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3031@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3032@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3033@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3034@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3035@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3036@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3037@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3038@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3039@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3040@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3041@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3042@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3043@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3044@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3045@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3046@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3047@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3048@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3049@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3050@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3051@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3052@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3053@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3054@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3055@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3056@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3057@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3058@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3059@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3060@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3061@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3062@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3063@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3064@1.0.0.yaml +78 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3065@1.0.0.yaml +84 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3066@1.0.0.yaml +84 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3067@1.0.0.yaml +88 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3068@1.0.0.yaml +94 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3069@1.0.0.yaml +90 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3070@1.0.0.yaml +99 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3071@1.0.0.yaml +91 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3072@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3073@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3074@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3075@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3076@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3077@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3078@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3079@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3080@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3081@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3082@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3083@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3084@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3085@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-016@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-028@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-042@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-044@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-045@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-050@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-201@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3001@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3006@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3009@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3012@1.0.0.yaml +41 -0
- raxe/plugins/__init__.py +98 -0
- raxe/plugins/custom_rules.py +380 -0
- raxe/plugins/loader.py +389 -0
- raxe/plugins/manager.py +538 -0
- raxe/plugins/protocol.py +428 -0
- raxe/py.typed +0 -0
- raxe/sdk/__init__.py +77 -0
- raxe/sdk/agent_scanner.py +1918 -0
- raxe/sdk/client.py +1603 -0
- raxe/sdk/decorator.py +175 -0
- raxe/sdk/exceptions.py +859 -0
- raxe/sdk/integrations/__init__.py +277 -0
- raxe/sdk/integrations/agent_scanner.py +71 -0
- raxe/sdk/integrations/autogen.py +872 -0
- raxe/sdk/integrations/crewai.py +1368 -0
- raxe/sdk/integrations/dspy.py +845 -0
- raxe/sdk/integrations/extractors.py +363 -0
- raxe/sdk/integrations/huggingface.py +395 -0
- raxe/sdk/integrations/langchain.py +948 -0
- raxe/sdk/integrations/litellm.py +484 -0
- raxe/sdk/integrations/llamaindex.py +1049 -0
- raxe/sdk/integrations/portkey.py +831 -0
- raxe/sdk/suppression_context.py +215 -0
- raxe/sdk/wrappers/__init__.py +163 -0
- raxe/sdk/wrappers/anthropic.py +310 -0
- raxe/sdk/wrappers/openai.py +221 -0
- raxe/sdk/wrappers/vertexai.py +484 -0
- raxe/utils/__init__.py +12 -0
- raxe/utils/error_sanitizer.py +135 -0
- raxe/utils/logging.py +241 -0
- raxe/utils/performance.py +414 -0
- raxe/utils/profiler.py +339 -0
- raxe/utils/validators.py +170 -0
- raxe-0.4.6.dist-info/METADATA +471 -0
- raxe-0.4.6.dist-info/RECORD +668 -0
- raxe-0.4.6.dist-info/WHEEL +5 -0
- raxe-0.4.6.dist-info/entry_points.txt +2 -0
- raxe-0.4.6.dist-info/licenses/LICENSE +56 -0
- raxe-0.4.6.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3023
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: financial
|
|
5
|
+
name: US Bank Account Number Detection
|
|
6
|
+
description: Detects US bank account numbers in context (6-17 digits)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.89
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:bank|checking|savings).{0,20}account.{0,20}(?:no|number|num|#).{0,10}\b([0-9]{6,17})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:account|acct).{0,10}(?:no|number|num|#).{0,10}\b([0-9]{10,17})\b
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "Bank account number: 1234567890123"
|
|
21
|
+
- "Checking acct #: 987654321012"
|
|
22
|
+
- "Savings account no: 12345678901234"
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "What is a bank account number?"
|
|
25
|
+
- "How many digits in account number?"
|
|
26
|
+
metrics:
|
|
27
|
+
precision: null
|
|
28
|
+
recall: null
|
|
29
|
+
f1_score: null
|
|
30
|
+
last_evaluated: null
|
|
31
|
+
mitre_attack:
|
|
32
|
+
- T1552.004
|
|
33
|
+
metadata:
|
|
34
|
+
created: '2025-11-16'
|
|
35
|
+
updated: '2025-11-16'
|
|
36
|
+
author: raxe-ce
|
|
37
|
+
category: financial
|
|
38
|
+
rule_hash: null
|
|
39
|
+
risk_explanation: Financial credential exposure (account numbers, routing numbers, cryptocurrency addresses) enables direct financial fraud and theft. Attackers can initiate unauthorized transactions, drain accounts, or conduct money laundering operations.
|
|
40
|
+
remediation_advice: Apply PCI DSS and financial data security standards. Use encryption and tokenization for financial data. Implement transaction monitoring and fraud detection. Restrict AI access to financial systems and data stores.
|
|
41
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3023-Us-Bank-Account-Number
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3024
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: financial
|
|
5
|
+
name: US Routing Number Detection
|
|
6
|
+
description: Detects US bank routing numbers (9 digits, ABA format)
|
|
7
|
+
severity: medium
|
|
8
|
+
confidence: 0.90
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:routing|ABA|RTN).{0,20}(?:no|number|num|#).{0,10}\b([0-9]{9})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "Routing number: 123456789"
|
|
17
|
+
- "ABA: 021000021"
|
|
18
|
+
- "RTN #: 111000025"
|
|
19
|
+
should_not_match:
|
|
20
|
+
- "What is a routing number?"
|
|
21
|
+
- "Routing numbers have 9 digits"
|
|
22
|
+
metrics:
|
|
23
|
+
precision: null
|
|
24
|
+
recall: null
|
|
25
|
+
f1_score: null
|
|
26
|
+
last_evaluated: null
|
|
27
|
+
mitre_attack:
|
|
28
|
+
- T1552.004
|
|
29
|
+
metadata:
|
|
30
|
+
created: '2025-11-16'
|
|
31
|
+
updated: '2025-11-16'
|
|
32
|
+
author: raxe-ce
|
|
33
|
+
category: financial
|
|
34
|
+
rule_hash: null
|
|
35
|
+
risk_explanation: Financial credential exposure (account numbers, routing numbers, cryptocurrency addresses) enables direct financial fraud and theft. Attackers can initiate unauthorized transactions, drain accounts, or conduct money laundering operations.
|
|
36
|
+
remediation_advice: Apply PCI DSS and financial data security standards. Use encryption and tokenization for financial data. Implement transaction monitoring and fraud detection. Restrict AI access to financial systems and data stores.
|
|
37
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3024-Us-Routing-Number-Detection
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3025
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: medical
|
|
5
|
+
name: Medical Record Number (MRN) Detection
|
|
6
|
+
description: Detects Medical Record Numbers in healthcare context
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.91
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:medical\s*record|MRN|patient\s*(?:ID|number)).{0,20}(?:no|number|num|#).{0,10}\b([A-Z0-9]{6,12})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "Medical Record Number: MRN12345678"
|
|
17
|
+
- "Patient ID: ABC123456"
|
|
18
|
+
- "MRN #: 987654321"
|
|
19
|
+
should_not_match:
|
|
20
|
+
- "What is an MRN?"
|
|
21
|
+
- "How to find medical record number?"
|
|
22
|
+
metrics:
|
|
23
|
+
precision: null
|
|
24
|
+
recall: null
|
|
25
|
+
f1_score: null
|
|
26
|
+
last_evaluated: null
|
|
27
|
+
mitre_attack:
|
|
28
|
+
- T1552.004
|
|
29
|
+
metadata:
|
|
30
|
+
created: '2025-11-16'
|
|
31
|
+
updated: '2025-11-16'
|
|
32
|
+
author: raxe-ce
|
|
33
|
+
category: hipaa
|
|
34
|
+
compliance: HIPAA
|
|
35
|
+
rule_hash: null
|
|
36
|
+
risk_explanation: Medical and health information exposure violates HIPAA regulations and patient privacy rights. Leaked health data can be used for discrimination, identity theft, or blackmail, and creates severe legal liabilities for healthcare organizations.
|
|
37
|
+
remediation_advice: Comply with HIPAA and healthcare privacy regulations. Implement strong access controls and encryption for medical records. Use de-identification and anonymization techniques. Audit all access to protected health information (PHI).
|
|
38
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3025-Medical-Record-Number-(Mrn)
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3026
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: medical
|
|
5
|
+
name: Health Insurance Policy Number Detection
|
|
6
|
+
description: Detects health insurance policy and member ID numbers
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.88
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:insurance|policy|member|subscriber).{0,20}(?:ID|no|number|num|#).{0,10}\b([A-Z]{2,3}[0-9]{8,12})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:insurance|policy|member).{0,20}(?:ID|no|number).{0,10}\b([0-9]{9,12})\b
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "Insurance ID: ABC123456789"
|
|
21
|
+
- "Member number: 987654321012"
|
|
22
|
+
- "Policy #: XYZ12345678"
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "What is an insurance ID?"
|
|
25
|
+
- "How to find policy number?"
|
|
26
|
+
metrics:
|
|
27
|
+
precision: null
|
|
28
|
+
recall: null
|
|
29
|
+
f1_score: null
|
|
30
|
+
last_evaluated: null
|
|
31
|
+
mitre_attack:
|
|
32
|
+
- T1552.004
|
|
33
|
+
metadata:
|
|
34
|
+
created: '2025-11-16'
|
|
35
|
+
updated: '2025-11-16'
|
|
36
|
+
author: raxe-ce
|
|
37
|
+
category: hipaa
|
|
38
|
+
compliance: HIPAA
|
|
39
|
+
rule_hash: null
|
|
40
|
+
risk_explanation: Medical and health information exposure violates HIPAA regulations and patient privacy rights. Leaked health data can be used for discrimination, identity theft, or blackmail, and creates severe legal liabilities for healthcare organizations.
|
|
41
|
+
remediation_advice: Comply with HIPAA and healthcare privacy regulations. Implement strong access controls and encryption for medical records. Use de-identification and anonymization techniques. Audit all access to protected health information (PHI).
|
|
42
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3026-Health-Insurance-Policy-Number
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3027
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: medical
|
|
5
|
+
name: ICD-10 Diagnosis Code Detection
|
|
6
|
+
description: Detects ICD-10 medical diagnosis codes in patient data context
|
|
7
|
+
severity: medium
|
|
8
|
+
confidence: 0.86
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:diagnosis|ICD-10|ICD10).{0,20}(?:code).{0,10}\b([A-Z][0-9]{2}\.?[A-Z0-9]{0,4})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "Diagnosis code: E11.9"
|
|
17
|
+
- "ICD-10: J44.0"
|
|
18
|
+
- "Primary diagnosis: I10"
|
|
19
|
+
should_not_match:
|
|
20
|
+
- "What is ICD-10?"
|
|
21
|
+
- "How to code diagnoses?"
|
|
22
|
+
metrics:
|
|
23
|
+
precision: null
|
|
24
|
+
recall: null
|
|
25
|
+
f1_score: null
|
|
26
|
+
last_evaluated: null
|
|
27
|
+
mitre_attack:
|
|
28
|
+
- T1552.004
|
|
29
|
+
metadata:
|
|
30
|
+
created: '2025-11-16'
|
|
31
|
+
updated: '2025-11-16'
|
|
32
|
+
author: raxe-ce
|
|
33
|
+
category: hipaa
|
|
34
|
+
compliance: HIPAA
|
|
35
|
+
rule_hash: null
|
|
36
|
+
risk_explanation: Medical and health information exposure violates HIPAA regulations and patient privacy rights. Leaked health data can be used for discrimination, identity theft, or blackmail, and creates severe legal liabilities for healthcare organizations.
|
|
37
|
+
remediation_advice: Comply with HIPAA and healthcare privacy regulations. Implement strong access controls and encryption for medical records. Use de-identification and anonymization techniques. Audit all access to protected health information (PHI).
|
|
38
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3027-Icd-10-Diagnosis-Code-Detection
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3028
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: medical
|
|
5
|
+
name: Prescription Number Detection (DEA)
|
|
6
|
+
description: Detects DEA prescription numbers and Rx numbers
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.90
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:prescription|Rx|DEA).{0,20}(?:no|number|num|#).{0,10}\b([A-Z]{2}[0-9]{7})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:prescription|Rx).{0,20}(?:no|number|num|#).{0,10}\b([0-9]{7,10})\b
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "DEA number: AB1234567"
|
|
21
|
+
- "Prescription #: 12345678"
|
|
22
|
+
- "Rx no: 987654321"
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "What is a DEA number?"
|
|
25
|
+
- "How to refill prescription?"
|
|
26
|
+
metrics:
|
|
27
|
+
precision: null
|
|
28
|
+
recall: null
|
|
29
|
+
f1_score: null
|
|
30
|
+
last_evaluated: null
|
|
31
|
+
mitre_attack:
|
|
32
|
+
- T1552.004
|
|
33
|
+
metadata:
|
|
34
|
+
created: '2025-11-16'
|
|
35
|
+
updated: '2025-11-16'
|
|
36
|
+
author: raxe-ce
|
|
37
|
+
category: hipaa
|
|
38
|
+
compliance: HIPAA
|
|
39
|
+
rule_hash: null
|
|
40
|
+
risk_explanation: Medical and health information exposure violates HIPAA regulations and patient privacy rights. Leaked health data can be used for discrimination, identity theft, or blackmail, and creates severe legal liabilities for healthcare organizations.
|
|
41
|
+
remediation_advice: Comply with HIPAA and healthcare privacy regulations. Implement strong access controls and encryption for medical records. Use de-identification and anonymization techniques. Audit all access to protected health information (PHI).
|
|
42
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3028-Prescription-Number-Detection-(Dea)
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3029
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: authentication
|
|
5
|
+
name: JWT Token Detection
|
|
6
|
+
description: Detects JSON Web Tokens (JWT) in format header.payload.signature
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(eyJ[A-Za-z0-9_-]{10,}\.eyJ[A-Za-z0-9_-]{10,}\.[A-Za-z0-9_-]{10,})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "Authorization: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIn0.dozjgNryP4J3jVmNHl0w5N_XgL0n3I9PlFUP0THsR8U"
|
|
16
|
+
- "token = eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJhdXRoMCJ9.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "JWT tokens start with eyJ"
|
|
19
|
+
- "How to decode JWT?"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
- T1528
|
|
28
|
+
metadata:
|
|
29
|
+
created: '2025-11-16'
|
|
30
|
+
updated: '2025-11-16'
|
|
31
|
+
author: raxe-ce
|
|
32
|
+
category: authentication_tokens
|
|
33
|
+
rule_hash: null
|
|
34
|
+
risk_explanation: Authentication token exposure (JWTs, bearer tokens, session cookies) grants attackers immediate access to authenticated sessions and user accounts. Unlike passwords, tokens provide direct access without needing additional authentication steps.
|
|
35
|
+
remediation_advice: Implement short token lifetimes and automatic rotation. Use secure token storage and transmission. Deploy token validation and revocation mechanisms. Never log or expose tokens in error messages or responses.
|
|
36
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3029-Jwt-Token-Detection
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3030
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: authentication
|
|
5
|
+
name: Bearer Token Detection
|
|
6
|
+
description: Detects Bearer authentication tokens in Authorization headers
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.94
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)bearer\s+([A-Za-z0-9\-._~+/]+=*)
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)authorization:\s*bearer\s+([A-Za-z0-9\-._~+/]{20,})
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "Authorization: Bearer ya29.a0AfH6SMBx..."
|
|
21
|
+
- "bearer abcdef1234567890ABCDEF"
|
|
22
|
+
- "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "Use Bearer token for authentication"
|
|
25
|
+
- "What is a Bearer token?"
|
|
26
|
+
metrics:
|
|
27
|
+
precision: null
|
|
28
|
+
recall: null
|
|
29
|
+
f1_score: null
|
|
30
|
+
last_evaluated: null
|
|
31
|
+
mitre_attack:
|
|
32
|
+
- T1552.001
|
|
33
|
+
- T1528
|
|
34
|
+
metadata:
|
|
35
|
+
created: '2025-11-16'
|
|
36
|
+
updated: '2025-11-16'
|
|
37
|
+
author: raxe-ce
|
|
38
|
+
category: authentication_tokens
|
|
39
|
+
rule_hash: null
|
|
40
|
+
risk_explanation: Authentication token exposure (JWTs, bearer tokens, session cookies) grants attackers immediate access to authenticated sessions and user accounts. Unlike passwords, tokens provide direct access without needing additional authentication steps.
|
|
41
|
+
remediation_advice: Implement short token lifetimes and automatic rotation. Use secure token storage and transmission. Deploy token validation and revocation mechanisms. Never log or expose tokens in error messages or responses.
|
|
42
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3030-Bearer-Token-Detection
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3031
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: authentication
|
|
5
|
+
name: OAuth Access Token Detection
|
|
6
|
+
description: Detects OAuth 2.0 access tokens in various formats
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.93
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:oauth|access).{0,20}token.{0,10}['\"]([A-Za-z0-9\-._~+/]{30,})['\"]
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "oauth_token='ya29.a0AfH6SMBxKqZ8...' "
|
|
17
|
+
- "access_token: ghr_1B2c3D4e5F6g7H8i9J0k..."
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "How to get an OAuth token?"
|
|
20
|
+
- "OAuth token format"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.001
|
|
28
|
+
- T1528
|
|
29
|
+
metadata:
|
|
30
|
+
created: '2025-11-16'
|
|
31
|
+
updated: '2025-11-16'
|
|
32
|
+
author: raxe-ce
|
|
33
|
+
category: authentication_tokens
|
|
34
|
+
rule_hash: null
|
|
35
|
+
risk_explanation: Authentication token exposure (JWTs, bearer tokens, session cookies) grants attackers immediate access to authenticated sessions and user accounts. Unlike passwords, tokens provide direct access without needing additional authentication steps.
|
|
36
|
+
remediation_advice: Implement short token lifetimes and automatic rotation. Use secure token storage and transmission. Deploy token validation and revocation mechanisms. Never log or expose tokens in error messages or responses.
|
|
37
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3031-Oauth-Access-Token-Detection
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3032
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: authentication
|
|
5
|
+
name: Session Cookie/Token Detection
|
|
6
|
+
description: Detects session IDs and session tokens in cookies or headers
|
|
7
|
+
severity: medium
|
|
8
|
+
confidence: 0.87
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:session|sess).{0,10}(?:id|token|key).{0,10}[=:]\s*([A-Za-z0-9]{32,})
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)PHPSESSID=([A-Za-z0-9]{26,})
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "sessionId=abc123def456ghi789jkl012mno345pqr"
|
|
21
|
+
- "PHPSESSID=1234567890abcdefghijklmnopqrstuvwxyz"
|
|
22
|
+
- "session_token: ABCD1234EFGH5678IJKL9012MNOP3456"
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "What is a session ID?"
|
|
25
|
+
- "How to manage sessions?"
|
|
26
|
+
metrics:
|
|
27
|
+
precision: null
|
|
28
|
+
recall: null
|
|
29
|
+
f1_score: null
|
|
30
|
+
last_evaluated: null
|
|
31
|
+
mitre_attack:
|
|
32
|
+
- T1539
|
|
33
|
+
- T1552.001
|
|
34
|
+
metadata:
|
|
35
|
+
created: '2025-11-16'
|
|
36
|
+
updated: '2025-11-16'
|
|
37
|
+
author: raxe-ce
|
|
38
|
+
category: authentication_tokens
|
|
39
|
+
rule_hash: null
|
|
40
|
+
risk_explanation: Authentication token exposure (JWTs, bearer tokens, session cookies) grants attackers immediate access to authenticated sessions and user accounts. Unlike passwords, tokens provide direct access without needing additional authentication steps.
|
|
41
|
+
remediation_advice: Implement short token lifetimes and automatic rotation. Use secure token storage and transmission. Deploy token validation and revocation mechanisms. Never log or expose tokens in error messages or responses.
|
|
42
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3032-Session-Cookie/Token-Detection
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3033
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: private_keys
|
|
5
|
+
name: RSA Private Key Detection
|
|
6
|
+
description: Detects RSA private keys in PEM format
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.99
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: -----BEGIN\s+RSA\s+PRIVATE\s+KEY-----
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: -----BEGIN\s+PRIVATE\s+KEY-----
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
examples:
|
|
17
|
+
should_match:
|
|
18
|
+
- "-----BEGIN RSA PRIVATE KEY-----"
|
|
19
|
+
- "-----BEGIN PRIVATE KEY-----"
|
|
20
|
+
should_not_match:
|
|
21
|
+
- "How to generate RSA keys?"
|
|
22
|
+
- "Example of private key format"
|
|
23
|
+
metrics:
|
|
24
|
+
precision: null
|
|
25
|
+
recall: null
|
|
26
|
+
f1_score: null
|
|
27
|
+
last_evaluated: null
|
|
28
|
+
mitre_attack:
|
|
29
|
+
- T1552.004
|
|
30
|
+
- T1145
|
|
31
|
+
metadata:
|
|
32
|
+
created: '2025-11-16'
|
|
33
|
+
updated: '2025-11-16'
|
|
34
|
+
author: raxe-ce
|
|
35
|
+
category: cryptographic_keys
|
|
36
|
+
rule_hash: null
|
|
37
|
+
risk_explanation: Private key exposure (RSA, SSH, PGP keys) completely compromises cryptographic security. Attackers with private keys can decrypt sensitive data, forge signatures, impersonate key owners, and gain unauthorized access to systems.
|
|
38
|
+
remediation_advice: Store private keys in hardware security modules (HSMs) or secure key management systems. Never transmit or log private keys. Implement key rotation and revocation procedures. Use separate keys for different purposes with appropriate access controls.
|
|
39
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3033-Rsa-Private-Key-Detection
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3034
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: private_keys
|
|
5
|
+
name: SSH Private Key Detection
|
|
6
|
+
description: Detects SSH private keys in PEM format (RSA, DSA, EC, Ed25519)
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.99
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: -----BEGIN\s+OPENSSH\s+PRIVATE\s+KEY-----
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: -----BEGIN\s+(?:DSA|EC|ENCRYPTED)\s+PRIVATE\s+KEY-----
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
examples:
|
|
17
|
+
should_match:
|
|
18
|
+
- "-----BEGIN OPENSSH PRIVATE KEY-----"
|
|
19
|
+
- "-----BEGIN DSA PRIVATE KEY-----"
|
|
20
|
+
- "-----BEGIN EC PRIVATE KEY-----"
|
|
21
|
+
should_not_match:
|
|
22
|
+
- "How to generate SSH keys?"
|
|
23
|
+
- "SSH key format examples"
|
|
24
|
+
metrics:
|
|
25
|
+
precision: null
|
|
26
|
+
recall: null
|
|
27
|
+
f1_score: null
|
|
28
|
+
last_evaluated: null
|
|
29
|
+
mitre_attack:
|
|
30
|
+
- T1552.004
|
|
31
|
+
- T1145
|
|
32
|
+
metadata:
|
|
33
|
+
created: '2025-11-16'
|
|
34
|
+
updated: '2025-11-16'
|
|
35
|
+
author: raxe-ce
|
|
36
|
+
category: cryptographic_keys
|
|
37
|
+
rule_hash: null
|
|
38
|
+
risk_explanation: Private key exposure (RSA, SSH, PGP keys) completely compromises cryptographic security. Attackers with private keys can decrypt sensitive data, forge signatures, impersonate key owners, and gain unauthorized access to systems.
|
|
39
|
+
remediation_advice: Store private keys in hardware security modules (HSMs) or secure key management systems. Never transmit or log private keys. Implement key rotation and revocation procedures. Use separate keys for different purposes with appropriate access controls.
|
|
40
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3034-Ssh-Private-Key-Detection
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3035
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: private_keys
|
|
5
|
+
name: PGP Private Key Detection
|
|
6
|
+
description: Detects PGP/GPG private keys in ASCII armor format
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.99
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: '-----BEGIN\s+PGP\s+PRIVATE\s+KEY\s+BLOCK-----'
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- Here is PII type 3035 information
|
|
16
|
+
- Accessing sensitive data 3035
|
|
17
|
+
- Personal information 3035 exposure
|
|
18
|
+
should_not_match:
|
|
19
|
+
- What is personally identifiable information?
|
|
20
|
+
- How do I protect my privacy?
|
|
21
|
+
- Explain data protection regulations
|
|
22
|
+
metrics:
|
|
23
|
+
precision: null
|
|
24
|
+
recall: null
|
|
25
|
+
f1_score: null
|
|
26
|
+
last_evaluated: null
|
|
27
|
+
mitre_attack:
|
|
28
|
+
- T1552.004
|
|
29
|
+
- T1145
|
|
30
|
+
metadata:
|
|
31
|
+
created: '2025-11-16'
|
|
32
|
+
updated: '2025-11-16'
|
|
33
|
+
author: raxe-ce
|
|
34
|
+
category: cryptographic_keys
|
|
35
|
+
rule_hash: null
|
|
36
|
+
risk_explanation: Private key exposure (RSA, SSH, PGP keys) completely compromises
|
|
37
|
+
cryptographic security. Attackers with private keys can decrypt sensitive data,
|
|
38
|
+
forge signatures, impersonate key owners, and gain unauthorized access to systems.
|
|
39
|
+
remediation_advice: Store private keys in hardware security modules (HSMs) or secure
|
|
40
|
+
key management systems. Never transmit or log private keys. Implement key rotation
|
|
41
|
+
and revocation procedures. Use separate keys for different purposes with appropriate
|
|
42
|
+
access controls.
|
|
43
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3035-Pgp-Private-Key-Detection
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3036
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: database_credentials
|
|
5
|
+
name: Database Connection String Detection (Generic)
|
|
6
|
+
description: Detects database connection strings with embedded credentials
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.95
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:jdbc|mysql|postgresql|mongodb|mssql)://[^:]+:([^@\s]+)@
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
# REDOS FIX: Replaced .{0,50} and .{0,30} with [^;]{0,50} and [^;]{0,30} to prevent greedy backtracking
|
|
15
|
+
# Also added minimum length requirement and excluded whitespace from password match
|
|
16
|
+
- pattern: (?i)(?:Server|Data\s*Source)=[^;]{0,50};(?:User\s*ID|UID)=[^;]{0,30};(?:Password|PWD)=([^;\s]{8,})
|
|
17
|
+
flags:
|
|
18
|
+
- IGNORECASE
|
|
19
|
+
timeout: 5.0
|
|
20
|
+
examples:
|
|
21
|
+
should_match:
|
|
22
|
+
- "jdbc:mysql://localhost:3306/db?user=admin&password=secret123"
|
|
23
|
+
- "mongodb://user:password123@localhost:27017/mydb"
|
|
24
|
+
- "Server=myserver;Database=mydb;User ID=sa;Password=MyP@ssw0rd;"
|
|
25
|
+
should_not_match:
|
|
26
|
+
- "How to create a connection string?"
|
|
27
|
+
- "Database connection examples"
|
|
28
|
+
metrics:
|
|
29
|
+
precision: null
|
|
30
|
+
recall: null
|
|
31
|
+
f1_score: null
|
|
32
|
+
last_evaluated: null
|
|
33
|
+
mitre_attack:
|
|
34
|
+
- T1552.001
|
|
35
|
+
metadata:
|
|
36
|
+
created: '2025-11-16'
|
|
37
|
+
updated: '2025-11-17'
|
|
38
|
+
author: raxe-ce
|
|
39
|
+
category: database_credentials
|
|
40
|
+
redos_fix: 'Pattern 2 fixed on 2025-11-17 to prevent greedy quantifier backtracking'
|
|
41
|
+
rule_hash: null
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3037
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: database_credentials
|
|
5
|
+
name: MongoDB Connection String Detection
|
|
6
|
+
description: Detects MongoDB connection strings with embedded credentials
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: mongodb(?:\+srv)?://[^:]+:([^@\s]+)@[^/\s]+
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "mongodb://admin:password123@cluster0.mongodb.net/test"
|
|
16
|
+
- "mongodb+srv://user:P@ssw0rd@cluster.mongodb.net/mydb"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "How to connect to MongoDB?"
|
|
19
|
+
- "MongoDB connection string format"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: database_credentials
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: Database connection string exposure reveals database locations, credentials, and configuration details. Attackers can use this information to directly access databases, extract sensitive data, modify records, or completely compromise data stores.
|
|
34
|
+
remediation_advice: Use secure secret management for database credentials. Implement connection string encryption and access controls. Never hardcode connection strings in code or configuration files. Use service principals and managed identities where possible.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3037-Mongodb-Connection-String-Detection
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3038
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: database_credentials
|
|
5
|
+
name: PostgreSQL Connection String Detection
|
|
6
|
+
description: Detects PostgreSQL connection strings with embedded credentials
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: postgres(?:ql)?://[^:]+:([^@\s]+)@[^/\s]+
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "postgresql://user:mypassword@localhost:5432/mydb"
|
|
16
|
+
- "postgres://admin:secret123@db.example.com/production"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "How to connect to PostgreSQL?"
|
|
19
|
+
- "PostgreSQL connection examples"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: database_credentials
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: Database connection string exposure reveals database locations, credentials, and configuration details. Attackers can use this information to directly access databases, extract sensitive data, modify records, or completely compromise data stores.
|
|
34
|
+
remediation_advice: Use secure secret management for database credentials. Implement connection string encryption and access controls. Never hardcode connection strings in code or configuration files. Use service principals and managed identities where possible.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3038-Postgresql-Connection-String-Detection
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3039
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: database_credentials
|
|
5
|
+
name: Redis Connection String Detection
|
|
6
|
+
description: Detects Redis connection strings with embedded passwords
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.96
|
|
9
|
+
patterns:
|
|
10
|
+
# REDOS FIX: Added maximum bounds to prevent infinite backtracking on negated character classes
|
|
11
|
+
# Replaced unbounded [^X]+ with bounded [^X]{1,N} for all components
|
|
12
|
+
- pattern: redis://(?::([^\s@]{1,256})@|[^:\s]{1,64}:([^\s@]{1,256})@)[^\s/]{1,256}
|
|
13
|
+
flags: []
|
|
14
|
+
timeout: 5.0
|
|
15
|
+
examples:
|
|
16
|
+
should_match:
|
|
17
|
+
- "redis://:mypassword@localhost:6379/0"
|
|
18
|
+
- "redis://user:password123@redis.example.com:6379"
|
|
19
|
+
should_not_match:
|
|
20
|
+
- "How to connect to Redis?"
|
|
21
|
+
- "Redis connection format"
|
|
22
|
+
metrics:
|
|
23
|
+
precision: null
|
|
24
|
+
recall: null
|
|
25
|
+
f1_score: null
|
|
26
|
+
last_evaluated: null
|
|
27
|
+
mitre_attack:
|
|
28
|
+
- T1552.001
|
|
29
|
+
metadata:
|
|
30
|
+
created: '2025-11-16'
|
|
31
|
+
updated: '2025-11-17'
|
|
32
|
+
author: raxe-ce
|
|
33
|
+
category: database_credentials
|
|
34
|
+
redos_fix: 'Pattern fixed on 2025-11-17 to add bounds and prevent backtracking on negated character classes'
|
|
35
|
+
rule_hash: null
|