raxe 0.4.6__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- raxe/__init__.py +101 -0
- raxe/application/__init__.py +48 -0
- raxe/application/ab_testing.py +170 -0
- raxe/application/analytics/__init__.py +30 -0
- raxe/application/analytics/achievement_service.py +444 -0
- raxe/application/analytics/repositories.py +172 -0
- raxe/application/analytics/retention_service.py +267 -0
- raxe/application/analytics/statistics_service.py +419 -0
- raxe/application/analytics/streak_service.py +283 -0
- raxe/application/apply_policy.py +291 -0
- raxe/application/eager_l2.py +503 -0
- raxe/application/preloader.py +353 -0
- raxe/application/scan_merger.py +321 -0
- raxe/application/scan_pipeline.py +1059 -0
- raxe/application/scan_pipeline_async.py +403 -0
- raxe/application/session_tracker.py +458 -0
- raxe/application/telemetry_manager.py +357 -0
- raxe/application/telemetry_orchestrator.py +1210 -0
- raxe/async_sdk/__init__.py +34 -0
- raxe/async_sdk/cache.py +286 -0
- raxe/async_sdk/client.py +556 -0
- raxe/async_sdk/wrappers/__init__.py +23 -0
- raxe/async_sdk/wrappers/openai.py +238 -0
- raxe/cli/__init__.py +21 -0
- raxe/cli/auth.py +1047 -0
- raxe/cli/branding.py +235 -0
- raxe/cli/config.py +334 -0
- raxe/cli/custom_rules.py +458 -0
- raxe/cli/doctor.py +686 -0
- raxe/cli/error_handler.py +665 -0
- raxe/cli/event.py +648 -0
- raxe/cli/exit_codes.py +57 -0
- raxe/cli/expiry_warning.py +302 -0
- raxe/cli/export.py +183 -0
- raxe/cli/history.py +247 -0
- raxe/cli/l2_formatter.py +872 -0
- raxe/cli/main.py +1137 -0
- raxe/cli/models.py +590 -0
- raxe/cli/output.py +403 -0
- raxe/cli/privacy.py +84 -0
- raxe/cli/profiler.py +262 -0
- raxe/cli/progress.py +379 -0
- raxe/cli/progress_context.py +101 -0
- raxe/cli/repl.py +394 -0
- raxe/cli/rules.py +542 -0
- raxe/cli/setup_wizard.py +721 -0
- raxe/cli/stats.py +292 -0
- raxe/cli/suppress.py +501 -0
- raxe/cli/telemetry.py +1384 -0
- raxe/cli/test.py +130 -0
- raxe/cli/tune.py +315 -0
- raxe/cli/validate.py +218 -0
- raxe/domain/__init__.py +30 -0
- raxe/domain/analytics/__init__.py +97 -0
- raxe/domain/analytics/achievements.py +306 -0
- raxe/domain/analytics/models.py +120 -0
- raxe/domain/analytics/retention.py +168 -0
- raxe/domain/analytics/statistics.py +207 -0
- raxe/domain/analytics/streaks.py +173 -0
- raxe/domain/engine/__init__.py +15 -0
- raxe/domain/engine/executor.py +396 -0
- raxe/domain/engine/matcher.py +212 -0
- raxe/domain/inline_suppression.py +176 -0
- raxe/domain/ml/__init__.py +133 -0
- raxe/domain/ml/embedding_cache.py +309 -0
- raxe/domain/ml/gemma_detector.py +921 -0
- raxe/domain/ml/gemma_models.py +346 -0
- raxe/domain/ml/l2_config.py +428 -0
- raxe/domain/ml/l2_output_schema.py +443 -0
- raxe/domain/ml/manifest_loader.py +309 -0
- raxe/domain/ml/manifest_schema.py +345 -0
- raxe/domain/ml/model_metadata.py +263 -0
- raxe/domain/ml/model_registry.py +786 -0
- raxe/domain/ml/protocol.py +282 -0
- raxe/domain/ml/scoring_models.py +419 -0
- raxe/domain/ml/stub_detector.py +397 -0
- raxe/domain/ml/threat_scorer.py +757 -0
- raxe/domain/ml/tokenizer_registry.py +372 -0
- raxe/domain/ml/voting/__init__.py +89 -0
- raxe/domain/ml/voting/config.py +595 -0
- raxe/domain/ml/voting/engine.py +465 -0
- raxe/domain/ml/voting/head_voters.py +378 -0
- raxe/domain/ml/voting/models.py +222 -0
- raxe/domain/models.py +82 -0
- raxe/domain/packs/__init__.py +17 -0
- raxe/domain/packs/models.py +304 -0
- raxe/domain/policies/__init__.py +20 -0
- raxe/domain/policies/evaluator.py +212 -0
- raxe/domain/policies/models.py +223 -0
- raxe/domain/rules/__init__.py +32 -0
- raxe/domain/rules/custom.py +286 -0
- raxe/domain/rules/models.py +273 -0
- raxe/domain/rules/schema.py +166 -0
- raxe/domain/rules/validator.py +556 -0
- raxe/domain/suppression.py +801 -0
- raxe/domain/suppression_factory.py +174 -0
- raxe/domain/telemetry/__init__.py +116 -0
- raxe/domain/telemetry/backpressure.py +424 -0
- raxe/domain/telemetry/event_creator.py +362 -0
- raxe/domain/telemetry/events.py +1282 -0
- raxe/domain/telemetry/priority.py +263 -0
- raxe/domain/telemetry/scan_telemetry_builder.py +670 -0
- raxe/infrastructure/__init__.py +25 -0
- raxe/infrastructure/analytics/__init__.py +18 -0
- raxe/infrastructure/analytics/aggregator.py +484 -0
- raxe/infrastructure/analytics/aggregator_optimized.py +184 -0
- raxe/infrastructure/analytics/engine.py +748 -0
- raxe/infrastructure/analytics/repository.py +409 -0
- raxe/infrastructure/analytics/streaks.py +467 -0
- raxe/infrastructure/analytics/views.py +178 -0
- raxe/infrastructure/cloud/__init__.py +9 -0
- raxe/infrastructure/config/__init__.py +56 -0
- raxe/infrastructure/config/endpoints.py +641 -0
- raxe/infrastructure/config/scan_config.py +352 -0
- raxe/infrastructure/config/yaml_config.py +459 -0
- raxe/infrastructure/database/__init__.py +10 -0
- raxe/infrastructure/database/connection.py +200 -0
- raxe/infrastructure/database/models.py +325 -0
- raxe/infrastructure/database/scan_history.py +764 -0
- raxe/infrastructure/ml/__init__.py +0 -0
- raxe/infrastructure/ml/download_progress.py +438 -0
- raxe/infrastructure/ml/model_downloader.py +457 -0
- raxe/infrastructure/models/__init__.py +16 -0
- raxe/infrastructure/models/discovery.py +461 -0
- raxe/infrastructure/packs/__init__.py +13 -0
- raxe/infrastructure/packs/loader.py +407 -0
- raxe/infrastructure/packs/registry.py +381 -0
- raxe/infrastructure/policies/__init__.py +16 -0
- raxe/infrastructure/policies/api_client.py +256 -0
- raxe/infrastructure/policies/validator.py +227 -0
- raxe/infrastructure/policies/yaml_loader.py +250 -0
- raxe/infrastructure/rules/__init__.py +18 -0
- raxe/infrastructure/rules/custom_loader.py +224 -0
- raxe/infrastructure/rules/versioning.py +222 -0
- raxe/infrastructure/rules/yaml_loader.py +286 -0
- raxe/infrastructure/security/__init__.py +31 -0
- raxe/infrastructure/security/auth.py +145 -0
- raxe/infrastructure/security/policy_validator.py +124 -0
- raxe/infrastructure/security/signatures.py +171 -0
- raxe/infrastructure/suppression/__init__.py +36 -0
- raxe/infrastructure/suppression/composite_repository.py +154 -0
- raxe/infrastructure/suppression/sqlite_repository.py +231 -0
- raxe/infrastructure/suppression/yaml_composite_repository.py +156 -0
- raxe/infrastructure/suppression/yaml_repository.py +510 -0
- raxe/infrastructure/telemetry/__init__.py +79 -0
- raxe/infrastructure/telemetry/acquisition.py +179 -0
- raxe/infrastructure/telemetry/config.py +254 -0
- raxe/infrastructure/telemetry/credential_store.py +947 -0
- raxe/infrastructure/telemetry/dual_queue.py +1123 -0
- raxe/infrastructure/telemetry/flush_helper.py +343 -0
- raxe/infrastructure/telemetry/flush_scheduler.py +776 -0
- raxe/infrastructure/telemetry/health_client.py +394 -0
- raxe/infrastructure/telemetry/hook.py +347 -0
- raxe/infrastructure/telemetry/queue.py +520 -0
- raxe/infrastructure/telemetry/sender.py +476 -0
- raxe/infrastructure/tracking/__init__.py +13 -0
- raxe/infrastructure/tracking/usage.py +389 -0
- raxe/integrations/__init__.py +55 -0
- raxe/integrations/availability.py +143 -0
- raxe/integrations/registry.py +122 -0
- raxe/integrations/utils.py +135 -0
- raxe/mcp/__init__.py +62 -0
- raxe/mcp/cli.py +97 -0
- raxe/mcp/server.py +409 -0
- raxe/monitoring/__init__.py +51 -0
- raxe/monitoring/metrics.py +372 -0
- raxe/monitoring/profiler.py +388 -0
- raxe/monitoring/server.py +136 -0
- raxe/packs/core/v1.0.0/pack.yaml +1394 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-001@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-006@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-014@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-017@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-022@1.0.0.yaml +67 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-023@1.0.0.yaml +91 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-024@1.0.0.yaml +80 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-025@1.0.0.yaml +81 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-026@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-027@1.0.0.yaml +77 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-028@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-029@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-030@1.0.0.yaml +55 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-033@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-034@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-035@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-046@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-047@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-048@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-049@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-050@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-068@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-078@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-2001@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-2004@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-201@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-202@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-203@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3007@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3016@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3026@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3027@1.0.0.yaml +64 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3028@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3029@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3030@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3031@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3032@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3033@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3034@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-79@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-80@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-81@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-82@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-83@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-84@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-85@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-86@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-87@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-88@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-89@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-90@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-91@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-92@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-93@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-94@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-95@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-96@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-97@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-98@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-007@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-015@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-016@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-017@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-021@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-022@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-023@1.0.0.yaml +78 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-024@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-025@1.0.0.yaml +93 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-026@1.0.0.yaml +81 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-027@1.0.0.yaml +82 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-028@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-033@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-036@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-037@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-052@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-054@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-056@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-065@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-075@1.0.0.yaml +45 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-079@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1080@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1090@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1104@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1105@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1112@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-201@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-202@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-203@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-204@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-205@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-206@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-207@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-208@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-209@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-210@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-211@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-212@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-213@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-214@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-215@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-216@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-217@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-218@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-219@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-220@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-221@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-222@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-223@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-224@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-225@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-226@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-227@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-228@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-229@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-230@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-231@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-232@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-233@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-234@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-235@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-236@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-237@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-238@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-013@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-019@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-020@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-024@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-029@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-038@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-044@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-067@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-069@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-100@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-101@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-102@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-103@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-104@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-105@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-106@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-107@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-108@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-109@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-110@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-111@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-112@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-113@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-114@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-115@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-116@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-117@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-118@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-119@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-120@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-201@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-203@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3004@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3006@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3011@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-5016@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-6001@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-6002@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-70@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-71@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-72@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-73@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-74@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-75@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-76@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-77@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-78@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-79@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-80@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-81@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-82@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-83@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-84@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-85@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-86@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-87@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-88@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-89@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-90@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-91@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-92@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-93@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-94@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-95@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-96@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-97@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-98@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-99@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-001@1.0.0.yaml +73 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-002@1.0.0.yaml +71 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-003@1.0.0.yaml +65 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-004@1.0.0.yaml +73 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-101@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-102@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-103@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-104@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-105@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-106@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-107@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-108@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-109@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-110@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-111@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-112@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-113@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-114@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-115@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-116@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-117@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-118@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-119@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-120@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-121@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-122@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-123@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-124@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-125@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-126@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-127@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-128@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-129@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-130@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-131@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-132@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-133@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-134@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-135@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-136@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-137@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-138@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-139@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-140@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-141@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-142@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-143@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-144@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-145@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-146@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-147@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-148@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-149@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-150@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-151@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-152@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-153@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-154@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-155@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-156@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-157@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-158@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-159@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-160@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-161@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-001@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-009@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-020@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-021@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-022@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-028@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-033@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-034@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-036@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-039@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-056@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-066@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-076@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-098@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-103@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-104@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-105@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-110@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-111@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-112@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-113@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-114@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-115@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-116@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-117@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-118@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-119@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-120@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-121@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-122@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-123@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-124@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-125@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-126@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-127@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-128@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-129@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-130@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-131@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-132@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-133@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-134@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-135@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-136@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-137@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-138@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-139@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-140@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-141@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-142@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-143@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-144@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-145@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-146@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-147@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-148@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-149@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-150@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-151@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-152@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-153@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-154@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-155@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-156@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-157@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-158@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-159@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-160@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-161@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-162@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-201@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-203@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-204@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-205@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-206@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-207@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-009@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-012@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-017@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-022@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-025@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-027@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-028@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-034@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-037@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-040@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-041@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-044@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-050@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-051@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-052@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-053@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-054@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-055@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-056@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-058@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2015@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2025@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2026@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2035@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2037@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2042@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3001@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3002@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3003@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3004@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3005@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3006@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3007@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3008@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3009@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3010@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3011@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3012@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3013@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3014@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3015@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3016@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3017@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3018@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3019@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3020@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3021@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3022@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3023@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3024@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3025@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3026@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3027@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3028@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3029@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3030@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3031@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3032@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3033@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3034@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3035@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3036@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3037@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3038@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3039@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3040@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3041@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3042@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3043@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3044@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3045@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3046@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3047@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3048@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3049@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3050@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3051@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3052@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3053@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3054@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3055@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3056@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3057@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3058@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3059@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3060@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3061@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3062@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3063@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3064@1.0.0.yaml +78 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3065@1.0.0.yaml +84 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3066@1.0.0.yaml +84 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3067@1.0.0.yaml +88 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3068@1.0.0.yaml +94 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3069@1.0.0.yaml +90 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3070@1.0.0.yaml +99 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3071@1.0.0.yaml +91 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3072@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3073@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3074@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3075@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3076@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3077@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3078@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3079@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3080@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3081@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3082@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3083@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3084@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3085@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-016@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-028@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-042@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-044@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-045@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-050@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-201@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3001@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3006@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3009@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3012@1.0.0.yaml +41 -0
- raxe/plugins/__init__.py +98 -0
- raxe/plugins/custom_rules.py +380 -0
- raxe/plugins/loader.py +389 -0
- raxe/plugins/manager.py +538 -0
- raxe/plugins/protocol.py +428 -0
- raxe/py.typed +0 -0
- raxe/sdk/__init__.py +77 -0
- raxe/sdk/agent_scanner.py +1918 -0
- raxe/sdk/client.py +1603 -0
- raxe/sdk/decorator.py +175 -0
- raxe/sdk/exceptions.py +859 -0
- raxe/sdk/integrations/__init__.py +277 -0
- raxe/sdk/integrations/agent_scanner.py +71 -0
- raxe/sdk/integrations/autogen.py +872 -0
- raxe/sdk/integrations/crewai.py +1368 -0
- raxe/sdk/integrations/dspy.py +845 -0
- raxe/sdk/integrations/extractors.py +363 -0
- raxe/sdk/integrations/huggingface.py +395 -0
- raxe/sdk/integrations/langchain.py +948 -0
- raxe/sdk/integrations/litellm.py +484 -0
- raxe/sdk/integrations/llamaindex.py +1049 -0
- raxe/sdk/integrations/portkey.py +831 -0
- raxe/sdk/suppression_context.py +215 -0
- raxe/sdk/wrappers/__init__.py +163 -0
- raxe/sdk/wrappers/anthropic.py +310 -0
- raxe/sdk/wrappers/openai.py +221 -0
- raxe/sdk/wrappers/vertexai.py +484 -0
- raxe/utils/__init__.py +12 -0
- raxe/utils/error_sanitizer.py +135 -0
- raxe/utils/logging.py +241 -0
- raxe/utils/performance.py +414 -0
- raxe/utils/profiler.py +339 -0
- raxe/utils/validators.py +170 -0
- raxe-0.4.6.dist-info/METADATA +471 -0
- raxe-0.4.6.dist-info/RECORD +668 -0
- raxe-0.4.6.dist-info/WHEEL +5 -0
- raxe-0.4.6.dist-info/entry_points.txt +2 -0
- raxe-0.4.6.dist-info/licenses/LICENSE +56 -0
- raxe-0.4.6.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3040
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: network
|
|
5
|
+
name: IPv4 Address in Sensitive Context Detection
|
|
6
|
+
description: Detects IPv4 addresses mentioned in security-sensitive contexts (internal, private, server)
|
|
7
|
+
severity: medium
|
|
8
|
+
confidence: 0.85
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:server|host|internal|private|vpn).{0,20}(?:IP|address).{0,10}\b((?:10|172\.(?:1[6-9]|2[0-9]|3[01])|192\.168)\.[0-9]{1,3}\.[0-9]{1,3})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:database|admin|management).{0,20}(?:IP|address).{0,10}\b([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3})\b
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "Internal server IP: 10.0.1.50"
|
|
21
|
+
- "Database host address: 172.16.254.1"
|
|
22
|
+
- "Admin panel at 192.168.1.100"
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "What is an IP address?"
|
|
25
|
+
- "Example: 192.168.1.1"
|
|
26
|
+
metrics:
|
|
27
|
+
precision: null
|
|
28
|
+
recall: null
|
|
29
|
+
f1_score: null
|
|
30
|
+
last_evaluated: null
|
|
31
|
+
mitre_attack:
|
|
32
|
+
- T1590.005
|
|
33
|
+
metadata:
|
|
34
|
+
created: '2025-11-16'
|
|
35
|
+
updated: '2025-11-16'
|
|
36
|
+
author: raxe-ce
|
|
37
|
+
category: network_info
|
|
38
|
+
rule_hash: null
|
|
39
|
+
risk_explanation: Network information exposure (IP addresses, MAC addresses, SSH keys) can enable reconnaissance, targeted attacks, or lateral movement within networks. This information helps attackers map infrastructure and identify potential entry points.
|
|
40
|
+
remediation_advice: Implement network segmentation and access controls. Use private IP addressing and NAT where appropriate. Monitor for network information leakage. Apply principles of least privilege for network access.
|
|
41
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3040-Ipv4-Address-In-Sensitive
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3041
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: network
|
|
5
|
+
name: MAC Address Detection
|
|
6
|
+
description: Detects MAC (Media Access Control) addresses in various formats
|
|
7
|
+
severity: low
|
|
8
|
+
confidence: 0.89
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b([0-9A-Fa-f]{2}[:-]){5}[0-9A-Fa-f]{2}\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: \b([0-9A-Fa-f]{4}\.){2}[0-9A-Fa-f]{4}\b
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
examples:
|
|
17
|
+
should_match:
|
|
18
|
+
- "Device MAC: 00:1A:2B:3C:4D:5E"
|
|
19
|
+
- "MAC address: 00-1A-2B-3C-4D-5E"
|
|
20
|
+
- "Network adapter: 001a.2b3c.4d5e"
|
|
21
|
+
should_not_match:
|
|
22
|
+
- "What is a MAC address?"
|
|
23
|
+
- "MAC address format examples"
|
|
24
|
+
metrics:
|
|
25
|
+
precision: null
|
|
26
|
+
recall: null
|
|
27
|
+
f1_score: null
|
|
28
|
+
last_evaluated: null
|
|
29
|
+
mitre_attack:
|
|
30
|
+
- T1590.005
|
|
31
|
+
metadata:
|
|
32
|
+
created: '2025-11-16'
|
|
33
|
+
updated: '2025-11-16'
|
|
34
|
+
author: raxe-ce
|
|
35
|
+
category: network_info
|
|
36
|
+
rule_hash: null
|
|
37
|
+
risk_explanation: Network information exposure (IP addresses, MAC addresses, SSH keys) can enable reconnaissance, targeted attacks, or lateral movement within networks. This information helps attackers map infrastructure and identify potential entry points.
|
|
38
|
+
remediation_advice: Implement network segmentation and access controls. Use private IP addressing and NAT where appropriate. Monitor for network information leakage. Apply principles of least privilege for network access.
|
|
39
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3041-Mac-Address-Detection
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3042
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Docker Hub Access Token Detection
|
|
6
|
+
description: Detects Docker Hub personal access tokens
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.94
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)docker.{0,20}(?:token|password|pat).{0,10}['\"]([a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12})['\"]
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "DOCKER_TOKEN='12345678-1234-1234-1234-123456789abc'"
|
|
17
|
+
- "docker_password: 'abcdef12-3456-7890-abcd-ef1234567890'"
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "How to create Docker Hub token?"
|
|
20
|
+
- "Docker authentication guide"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.001
|
|
28
|
+
metadata:
|
|
29
|
+
created: '2025-11-16'
|
|
30
|
+
updated: '2025-11-16'
|
|
31
|
+
author: raxe-ce
|
|
32
|
+
category: container_credentials
|
|
33
|
+
rule_hash: null
|
|
34
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
35
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
36
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3042-Docker-Hub-Access-Token
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3043
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: npm Access Token Detection
|
|
6
|
+
description: Detects npm (Node Package Manager) access tokens
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.96
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(npm_[A-Za-z0-9]{36})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "NPM_TOKEN=npm_1234567890abcdefghijklmnopqrstuvwx"
|
|
16
|
+
- "token: npm_ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "npm tokens start with npm_"
|
|
19
|
+
- "How to create npm token?"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: package_manager_credentials
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
34
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3043-Npm-Access-Token-Detection
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3044
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: PyPI API Token Detection
|
|
6
|
+
description: Detects PyPI (Python Package Index) API tokens
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(pypi-AgEIcHlwaS5vcmc[A-Za-z0-9\-_]{70,})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- Here is PII type 3044 information
|
|
16
|
+
- Accessing sensitive data 3044
|
|
17
|
+
- Personal information 3044 exposure
|
|
18
|
+
should_not_match:
|
|
19
|
+
- What is personally identifiable information?
|
|
20
|
+
- How do I protect my privacy?
|
|
21
|
+
- Explain data protection regulations
|
|
22
|
+
metrics:
|
|
23
|
+
precision: null
|
|
24
|
+
recall: null
|
|
25
|
+
f1_score: null
|
|
26
|
+
last_evaluated: null
|
|
27
|
+
mitre_attack:
|
|
28
|
+
- T1552.001
|
|
29
|
+
metadata:
|
|
30
|
+
created: '2025-11-16'
|
|
31
|
+
updated: '2025-11-16'
|
|
32
|
+
author: raxe-ce
|
|
33
|
+
category: package_manager_credentials
|
|
34
|
+
rule_hash: null
|
|
35
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates
|
|
36
|
+
critical security vulnerabilities. Leaked API keys grant attackers access to cloud
|
|
37
|
+
services, third-party platforms, and internal systems, potentially leading to data
|
|
38
|
+
breaches, resource abuse, or financial fraud.
|
|
39
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement
|
|
40
|
+
automated key rotation and revocation. Use secret detection tools in development
|
|
41
|
+
and production pipelines. Never log or persist API keys. Apply access controls to
|
|
42
|
+
prevent AI systems from accessing key stores.
|
|
43
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3044-Pypi-Api-Token-Detection
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3045
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: GitLab Personal Access Token Detection
|
|
6
|
+
description: Detects GitLab personal access tokens (glpat- pattern)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.98
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(glpat-[A-Za-z0-9\-_]{20,})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "GITLAB_TOKEN=glpat-1234567890abcdefghij"
|
|
16
|
+
- "token: glpat-ABCDEFGHIJKLMNOPQRST"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "GitLab tokens start with glpat-"
|
|
19
|
+
- "How to create GitLab PAT?"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
- T1528
|
|
28
|
+
metadata:
|
|
29
|
+
created: '2025-11-16'
|
|
30
|
+
updated: '2025-11-16'
|
|
31
|
+
author: raxe-ce
|
|
32
|
+
category: vcs_credentials
|
|
33
|
+
rule_hash: null
|
|
34
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
35
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
36
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3045-Gitlab-Personal-Access-Token
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3046
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Bitbucket App Password Detection
|
|
6
|
+
description: Detects Bitbucket app passwords and access tokens
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.92
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)bitbucket.{0,20}(?:password|token|app).{0,10}['\"]([A-Za-z0-9]{16,})['\"]
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "BITBUCKET_APP_PASSWORD='ABCDEFGHIJKLMNOP'"
|
|
17
|
+
- "bitbucket_token: '1234567890ABCDEFGHIJ'"
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "How to create Bitbucket app password?"
|
|
20
|
+
- "Bitbucket authentication guide"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.001
|
|
28
|
+
- T1528
|
|
29
|
+
metadata:
|
|
30
|
+
created: '2025-11-16'
|
|
31
|
+
updated: '2025-11-16'
|
|
32
|
+
author: raxe-ce
|
|
33
|
+
category: vcs_credentials
|
|
34
|
+
rule_hash: null
|
|
35
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
36
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
37
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3046-Bitbucket-App-Password-Detection
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3047
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Cloudflare API Token Detection
|
|
6
|
+
description: Detects Cloudflare API tokens and keys
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.94
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)cloudflare.{0,20}(?:api|token|key).{0,10}['\"]([A-Za-z0-9_-]{40,})['\"]
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "CLOUDFLARE_API_KEY='1234567890abcdefghijklmnopqrstuvwxyz1234'"
|
|
17
|
+
- "cf_token: 'ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890abcd'"
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "How to get Cloudflare API key?"
|
|
20
|
+
- "Cloudflare token format"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.001
|
|
28
|
+
metadata:
|
|
29
|
+
created: '2025-11-16'
|
|
30
|
+
updated: '2025-11-16'
|
|
31
|
+
author: raxe-ce
|
|
32
|
+
category: cdn_credentials
|
|
33
|
+
rule_hash: null
|
|
34
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
35
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
36
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3047-Cloudflare-Api-Token-Detection
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3048
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: DigitalOcean API Token Detection
|
|
6
|
+
description: Detects DigitalOcean personal access tokens
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.93
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)digitalocean.{0,20}(?:token|key|pat).{0,10}['\"]([a-f0-9]{64})['\"]
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "DO_TOKEN='1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef'"
|
|
17
|
+
- "digitalocean_key: 'abcdef1234567890abcdef1234567890abcdef1234567890abcdef1234567890'"
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "How to create DigitalOcean token?"
|
|
20
|
+
- "DigitalOcean API guide"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.001
|
|
28
|
+
metadata:
|
|
29
|
+
created: '2025-11-16'
|
|
30
|
+
updated: '2025-11-16'
|
|
31
|
+
author: raxe-ce
|
|
32
|
+
category: cloud_credentials
|
|
33
|
+
rule_hash: null
|
|
34
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
35
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
36
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3048-Digitalocean-Api-Token-Detection
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3049
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Square Access Token Detection
|
|
6
|
+
description: Detects Square payment API access tokens
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \bsq0atp-[0-9A-Za-z\-_]{22,}
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: \bsq0csp-[0-9A-Za-z\-_]{43,}
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
examples:
|
|
17
|
+
should_match:
|
|
18
|
+
- "SQUARE_ACCESS_TOKEN=sq0atp-1234567890abcdefghijklmnop"
|
|
19
|
+
- "square_token: sq0csp-ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890abcdefg"
|
|
20
|
+
should_not_match:
|
|
21
|
+
- "Square tokens start with sq0"
|
|
22
|
+
- "How to get Square API key?"
|
|
23
|
+
metrics:
|
|
24
|
+
precision: null
|
|
25
|
+
recall: null
|
|
26
|
+
f1_score: null
|
|
27
|
+
last_evaluated: null
|
|
28
|
+
mitre_attack:
|
|
29
|
+
- T1552.001
|
|
30
|
+
metadata:
|
|
31
|
+
created: '2025-11-16'
|
|
32
|
+
updated: '2025-11-16'
|
|
33
|
+
author: raxe-ce
|
|
34
|
+
category: payment_credentials
|
|
35
|
+
rule_hash: null
|
|
36
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
37
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
38
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3049-Square-Access-Token-Detection
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3050
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: PayPal Client Secret Detection
|
|
6
|
+
description: Detects PayPal API client secrets and access tokens
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.95
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)paypal.{0,20}(?:secret|client).{0,10}['\"]([A-Za-z0-9\-_]{80,})['\"]
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- Here is PII type 3050 information
|
|
17
|
+
- Accessing sensitive data 3050
|
|
18
|
+
- Personal information 3050 exposure
|
|
19
|
+
should_not_match:
|
|
20
|
+
- What is personally identifiable information?
|
|
21
|
+
- How do I protect my privacy?
|
|
22
|
+
- Explain data protection regulations
|
|
23
|
+
metrics:
|
|
24
|
+
precision: null
|
|
25
|
+
recall: null
|
|
26
|
+
f1_score: null
|
|
27
|
+
last_evaluated: null
|
|
28
|
+
mitre_attack:
|
|
29
|
+
- T1552.001
|
|
30
|
+
metadata:
|
|
31
|
+
created: '2025-11-16'
|
|
32
|
+
updated: '2025-11-16'
|
|
33
|
+
author: raxe-ce
|
|
34
|
+
category: payment_credentials
|
|
35
|
+
rule_hash: null
|
|
36
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates
|
|
37
|
+
critical security vulnerabilities. Leaked API keys grant attackers access to cloud
|
|
38
|
+
services, third-party platforms, and internal systems, potentially leading to data
|
|
39
|
+
breaches, resource abuse, or financial fraud.
|
|
40
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement
|
|
41
|
+
automated key rotation and revocation. Use secret detection tools in development
|
|
42
|
+
and production pipelines. Never log or persist API keys. Apply access controls to
|
|
43
|
+
prevent AI systems from accessing key stores.
|
|
44
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3050-Paypal-Client-Secret-Detection
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3051
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Hugging Face API Token Detection
|
|
6
|
+
description: Detects Hugging Face API tokens (hf_ pattern)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(hf_[A-Za-z0-9]{32,})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "HF_TOKEN=hf_abcdefghijklmnopqrstuvwxyz1234567890"
|
|
16
|
+
- "token: hf_ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890ABCDEF"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "Hugging Face tokens start with hf_"
|
|
19
|
+
- "How to get HF API token?"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: ai_credentials
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
34
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3051-Hugging-Face-Api-Token
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3052
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Cohere API Key Detection
|
|
6
|
+
description: Detects Cohere AI API keys
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.96
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)cohere.{0,20}(?:api|key|token).{0,10}['\"]([A-Za-z0-9]{40,})['\"]
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "COHERE_API_KEY='1234567890abcdefghijklmnopqrstuvwxyzABCD'"
|
|
17
|
+
- "cohere_key: 'ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890abcdefgh'"
|
|
18
|
+
should_not_match:
|
|
19
|
+
- "How to get Cohere API key?"
|
|
20
|
+
- "Cohere API documentation"
|
|
21
|
+
metrics:
|
|
22
|
+
precision: null
|
|
23
|
+
recall: null
|
|
24
|
+
f1_score: null
|
|
25
|
+
last_evaluated: null
|
|
26
|
+
mitre_attack:
|
|
27
|
+
- T1552.001
|
|
28
|
+
metadata:
|
|
29
|
+
created: '2025-11-16'
|
|
30
|
+
updated: '2025-11-16'
|
|
31
|
+
author: raxe-ce
|
|
32
|
+
category: ai_credentials
|
|
33
|
+
rule_hash: null
|
|
34
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
35
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
36
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3052-Cohere-Api-Key-Detection
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3053
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: api_keys
|
|
5
|
+
name: Replicate API Token Detection
|
|
6
|
+
description: Detects Replicate AI platform API tokens
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.95
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(r8_[A-Za-z0-9]{40,})\b
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "REPLICATE_API_TOKEN=r8_1234567890abcdefghijklmnopqrstuvwxyzABCDEF"
|
|
16
|
+
- "token: r8_ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890abcdefgh"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "Replicate tokens start with r8_"
|
|
19
|
+
- "How to use Replicate API?"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.001
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: ai_credentials
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: API key exposure in prompts, responses, or training data creates critical security vulnerabilities. Leaked API keys grant attackers access to cloud services, third-party platforms, and internal systems, potentially leading to data breaches, resource abuse, or financial fraud.
|
|
34
|
+
remediation_advice: Scan all data sources for API keys before AI processing. Implement automated key rotation and revocation. Use secret detection tools in development and production pipelines. Never log or persist API keys. Apply access controls to prevent AI systems from accessing key stores.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3053-Replicate-Api-Token-Detection
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3054
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: network
|
|
5
|
+
name: SSH Authorized Keys Detection
|
|
6
|
+
description: Detects SSH public keys being extracted or leaked
|
|
7
|
+
severity: medium
|
|
8
|
+
confidence: 0.89
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \b(ssh-(?:rsa|dss|ed25519|ecdsa)\s+[A-Za-z0-9+/]{50,}[=]{0,2})
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
examples:
|
|
14
|
+
should_match:
|
|
15
|
+
- "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAklOUpkDHrfHY17SbrmTIpNLTGK9Tjom/BWDSU user@host"
|
|
16
|
+
- "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl"
|
|
17
|
+
should_not_match:
|
|
18
|
+
- "How to generate SSH keys?"
|
|
19
|
+
- "SSH key format examples"
|
|
20
|
+
metrics:
|
|
21
|
+
precision: null
|
|
22
|
+
recall: null
|
|
23
|
+
f1_score: null
|
|
24
|
+
last_evaluated: null
|
|
25
|
+
mitre_attack:
|
|
26
|
+
- T1552.004
|
|
27
|
+
metadata:
|
|
28
|
+
created: '2025-11-16'
|
|
29
|
+
updated: '2025-11-16'
|
|
30
|
+
author: raxe-ce
|
|
31
|
+
category: cryptographic_keys
|
|
32
|
+
rule_hash: null
|
|
33
|
+
risk_explanation: Network information exposure (IP addresses, MAC addresses, SSH keys) can enable reconnaissance, targeted attacks, or lateral movement within networks. This information helps attackers map infrastructure and identify potential entry points.
|
|
34
|
+
remediation_advice: Implement network segmentation and access controls. Use private IP addressing and NAT where appropriate. Monitor for network information leakage. Apply principles of least privilege for network access.
|
|
35
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3054-Ssh-Authorized-Keys-Detection
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3055
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: identity_documents
|
|
5
|
+
name: Australian Tax File Number (TFN) Detection
|
|
6
|
+
description: Detects Australian Tax File Numbers
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.90
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:TFN|tax\s*file).{0,20}(?:no|number|num).{0,10}\b([0-9]{3}\s*[0-9]{3}\s*[0-9]{3})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:TFN|tax\s*file).{0,20}(?:no|number|num).{0,10}\b([0-9]{9})\b
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "TFN: 123 456 789"
|
|
21
|
+
- "Tax File Number: 987654321"
|
|
22
|
+
should_not_match:
|
|
23
|
+
- "What is a TFN?"
|
|
24
|
+
- "How to apply for Tax File Number?"
|
|
25
|
+
metrics:
|
|
26
|
+
precision: null
|
|
27
|
+
recall: null
|
|
28
|
+
f1_score: null
|
|
29
|
+
last_evaluated: null
|
|
30
|
+
mitre_attack:
|
|
31
|
+
- T1552.004
|
|
32
|
+
metadata:
|
|
33
|
+
created: '2025-11-16'
|
|
34
|
+
updated: '2025-11-16'
|
|
35
|
+
author: raxe-ce
|
|
36
|
+
category: identity_documents
|
|
37
|
+
rule_hash: null
|
|
38
|
+
risk_explanation: Identity document numbers (passports, driver licenses, national ID numbers) enable identity theft and fraud when exposed. Attackers can use these credentials to impersonate victims, open fraudulent accounts, or bypass authentication systems.
|
|
39
|
+
remediation_advice: Implement strict access controls for identity document data. Use tokenization or anonymization when processing identity information. Deploy DLP controls that detect and block identity document leakage. Maintain audit logs of all access to identity data.
|
|
40
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3055-Australian-Tax-File-Number
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: pii-3056
|
|
3
|
+
family: PII
|
|
4
|
+
sub_family: financial
|
|
5
|
+
name: CVV/CVC Security Code Detection
|
|
6
|
+
description: Detects credit card CVV/CVC security codes in context
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.88
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:cvv|cvc|cid|cvv2|csc).{0,10}(?:code|number|no)?.{0,10}\b([0-9]{3,4})\b
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
examples:
|
|
15
|
+
should_match:
|
|
16
|
+
- "CVV: 123"
|
|
17
|
+
- "CVC code: 4567"
|
|
18
|
+
- "Card CVV2 number is 789"
|
|
19
|
+
should_not_match:
|
|
20
|
+
- "What is CVV?"
|
|
21
|
+
- "Where to find CVC code?"
|
|
22
|
+
- "CVV is on the back of the card"
|
|
23
|
+
metrics:
|
|
24
|
+
precision: null
|
|
25
|
+
recall: null
|
|
26
|
+
f1_score: null
|
|
27
|
+
last_evaluated: null
|
|
28
|
+
mitre_attack:
|
|
29
|
+
- T1552.004
|
|
30
|
+
metadata:
|
|
31
|
+
created: '2025-11-16'
|
|
32
|
+
updated: '2025-11-16'
|
|
33
|
+
author: raxe-ce
|
|
34
|
+
category: financial
|
|
35
|
+
rule_hash: null
|
|
36
|
+
risk_explanation: Financial credential exposure (account numbers, routing numbers, cryptocurrency addresses) enables direct financial fraud and theft. Attackers can initiate unauthorized transactions, drain accounts, or conduct money laundering operations.
|
|
37
|
+
remediation_advice: Apply PCI DSS and financial data security standards. Use encryption and tokenization for financial data. Implement transaction monitoring and fraud detection. Restrict AI access to financial systems and data stores.
|
|
38
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/PII-3056-Cvv/Cvc-Security-Code-Detection
|