Skip to content

Commit c252078

Browse files
author
Security Research (r2c-argo)
committed
Merge Gitleaks rules 2025-01-03 # 01:31
1 parent 1c92567 commit c252078

File tree

198 files changed

+898
-170
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

198 files changed

+898
-170
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
rules:
2+
- id: 1password-service-account-token
3+
message: A gitleaks 1password-service-account-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
4+
languages:
5+
- regex
6+
severity: INFO
7+
metadata:
8+
likelihood: LOW
9+
impact: MEDIUM
10+
confidence: LOW
11+
category: security
12+
cwe:
13+
- "CWE-798: Use of Hard-coded Credentials"
14+
cwe2021-top25: true
15+
cwe2022-top25: true
16+
owasp:
17+
- A07:2021 - Identification and Authentication Failures
18+
references:
19+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
20+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
21+
subcategory:
22+
- vuln
23+
technology:
24+
- gitleaks
25+
patterns:
26+
- pattern-regex: (ops_eyJ[a-zA-Z0-9+/]{250,}={0,3})

generic/secrets/gitleaks/adafruit-api-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:adafruit)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9_-]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:adafruit)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9_-]{32})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/adobe-client-id.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:adobe)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-f0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:adobe)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-f0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/adobe-client-secret.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)\b((p8e-)(?i)[a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: (\b(p8e-(?i)[a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/age-secret-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: AGE-SECRET-KEY-1[QPZRY9X8GF2TVDW0S3JN54KHCE6MUA7L]{58}
26+
- pattern-regex: (AGE-SECRET-KEY-1[QPZRY9X8GF2TVDW0S3JN54KHCE6MUA7L]{58})

generic/secrets/gitleaks/airtable-api-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:airtable)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{17})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:airtable)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{17})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/algolia-api-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:algolia)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:algolia)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/alibaba-access-key-id.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)\b((LTAI)(?i)[a-z0-9]{20})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: (\b(LTAI(?i)[a-z0-9]{20})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/alibaba-secret-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:alibaba)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{30})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:alibaba)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{30})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/asana-client-id.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:asana)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([0-9]{16})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:asana)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([0-9]{16})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/asana-client-secret.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:asana)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:asana)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/atlassian-api-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:atlassian|confluence|jira)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{24})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ([\w.-]{0,50}?(?i:[\w.-]{0,50}?(?:atlassian|confluence|jira)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3})(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-zA-Z0-9]{24})(?:['|\"|\n|\r|\s|\x60|;]|$)|\b(ATATT3[A-Za-z0-9_\-=]{186})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/authress-service-client-access-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)\b((?:sc|ext|scauth|authress)_[a-z0-9]{5,30}\.[a-z0-9]{4,6}\.acc[_-][a-z0-9-]{10,32}\.[a-z0-9+/_=-]{30,120})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: (\b((?:sc|ext|scauth|authress)_(?i)[a-z0-9]{5,30}\.[a-z0-9]{4,6}\.(?-i:acc)[_-][a-z0-9-]{10,32}\.[a-z0-9+/_=-]{30,120})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/aws-access-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}
26+
- pattern-regex: (\b((?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16})\b)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
rules:
2+
- id: azure-ad-client-secret
3+
message: A gitleaks azure-ad-client-secret was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
4+
languages:
5+
- regex
6+
severity: INFO
7+
metadata:
8+
likelihood: LOW
9+
impact: MEDIUM
10+
confidence: LOW
11+
category: security
12+
cwe:
13+
- "CWE-798: Use of Hard-coded Credentials"
14+
cwe2021-top25: true
15+
cwe2022-top25: true
16+
owasp:
17+
- A07:2021 - Identification and Authentication Failures
18+
references:
19+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
20+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
21+
subcategory:
22+
- vuln
23+
technology:
24+
- gitleaks
25+
patterns:
26+
- pattern-regex: ((?:^|[\\'"\x60\s>=:(,)])([a-zA-Z0-9_~.]{3}\dQ~[a-zA-Z0-9_~.-]{31,34})(?:$|[\\'"\x60\s<),]))

generic/secrets/gitleaks/beamer-api-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:beamer)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(b_[a-z0-9=_\-]{44})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:beamer)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(b_[a-z0-9=_\-]{44})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/bitbucket-client-id.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:bitbucket)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:bitbucket)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/bitbucket-client-secret.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:bitbucket)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9=_\-]{64})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:bitbucket)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9=_\-]{64})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/bittrex-access-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:bittrex)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:bittrex)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/bittrex-secret-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:bittrex)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:bittrex)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/clojars-api-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(CLOJARS_)[a-z0-9]{60}
26+
- pattern-regex: ((?i)CLOJARS_[a-z0-9]{60})

generic/secrets/gitleaks/cloudflare-api-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:cloudflare)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9_-]{40})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:cloudflare)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9_-]{40})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/cloudflare-global-api-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:cloudflare)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-f0-9]{37})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:cloudflare)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-f0-9]{37})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/cloudflare-origin-ca-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: \b(v1\.0-[a-f0-9]{24}-[a-f0-9]{146})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: (\b(v1\.0-[a-f0-9]{24}-[a-f0-9]{146})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/codecov-access-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:codecov)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:codecov)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$))
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
rules:
2+
- id: cohere-api-token
3+
message: A gitleaks cohere-api-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
4+
languages:
5+
- regex
6+
severity: INFO
7+
metadata:
8+
likelihood: LOW
9+
impact: MEDIUM
10+
confidence: LOW
11+
category: security
12+
cwe:
13+
- "CWE-798: Use of Hard-coded Credentials"
14+
cwe2021-top25: true
15+
cwe2022-top25: true
16+
owasp:
17+
- A07:2021 - Identification and Authentication Failures
18+
references:
19+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
20+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
21+
subcategory:
22+
- vuln
23+
technology:
24+
- gitleaks
25+
patterns:
26+
- pattern-regex: ([\w.-]{0,50}?(?i:[\w.-]{0,50}?(?:cohere|CO_API_KEY)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3})(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-zA-Z0-9]{40})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/coinbase-access-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:coinbase)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9_-]{64})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:coinbase)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9_-]{64})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/confluent-access-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:confluent)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{16})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:confluent)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{16})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/confluent-secret-key.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:confluent)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:confluent)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/contentful-delivery-api-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:contentful)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9=_\-]{43})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:contentful)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9=_\-]{43})(?:['|\"|\n|\r|\s|\x60|;]|$))
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
rules:
2+
- id: curl-auth-header
3+
message: A gitleaks curl-auth-header was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
4+
languages:
5+
- regex
6+
severity: INFO
7+
metadata:
8+
likelihood: LOW
9+
impact: MEDIUM
10+
confidence: LOW
11+
category: security
12+
cwe:
13+
- "CWE-798: Use of Hard-coded Credentials"
14+
cwe2021-top25: true
15+
cwe2022-top25: true
16+
owasp:
17+
- A07:2021 - Identification and Authentication Failures
18+
references:
19+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
20+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
21+
subcategory:
22+
- vuln
23+
technology:
24+
- gitleaks
25+
patterns:
26+
- pattern-regex: (\bcurl\b(?:.*?|.*?(?:[\r\n]{1,2}.*?){1,5})[ \t\n\r](?:-H|--header)(?:=|[ \t]{0,5})(?:"(?i)(?:Authorization:[ \t]{0,5}(?:Basic[ \t]([a-z0-9+/]{8,}={0,3})|(?:Bearer|(?:Api-)?Token)[ \t]([\w=~@.+/-]{8,})|([\w=~@.+/-]{8,}))|(?:(?:X-(?:[a-z]+-)?)?(?:Api-?)?(?:Key|Token)):[ \t]{0,5}([\w=~@.+/-]{8,}))"|'(?i)(?:Authorization:[ \t]{0,5}(?:Basic[ \t]([a-z0-9+/]{8,}={0,3})|(?:Bearer|(?:Api-)?Token)[ \t]([\w=~@.+/-]{8,})|([\w=~@.+/-]{8,}))|(?:(?:X-(?:[a-z]+-)?)?(?:Api-?)?(?:Key|Token)):[ \t]{0,5}([\w=~@.+/-]{8,}))')(?:\B|\s|\z))
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
rules:
2+
- id: curl-auth-user
3+
message: A gitleaks curl-auth-user was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
4+
languages:
5+
- regex
6+
severity: INFO
7+
metadata:
8+
likelihood: LOW
9+
impact: MEDIUM
10+
confidence: LOW
11+
category: security
12+
cwe:
13+
- "CWE-798: Use of Hard-coded Credentials"
14+
cwe2021-top25: true
15+
cwe2022-top25: true
16+
owasp:
17+
- A07:2021 - Identification and Authentication Failures
18+
references:
19+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
20+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
21+
subcategory:
22+
- vuln
23+
technology:
24+
- gitleaks
25+
patterns:
26+
- pattern-regex: (\bcurl\b(?:.*|.*(?:[\r\n]{1,2}.*){1,5})[ \t\n\r](?:-u|--user)(?:=|[ \t]{0,5})(?:"([^:"]{3,}:[^"]{3,})"|'([^:']{3,}:[^']{3,})'|((?:"[^"]{3,}"|'[^']{3,}'|[\[email protected]]+):(?:"[^"]{3,}"|'[^']{3,}'|[\w${}@.-]+)))(?:\s|\z))

generic/secrets/gitleaks/databricks-api-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)\b(dapi[a-h0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: (\b(dapi[a-f0-9]{32}(?:-\d)?)(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/datadog-access-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:datadog)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{40})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:datadog)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{40})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/defined-networking-api-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:dnkey)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(dnkey-[a-z0-9=_\-]{26}-[a-z0-9=_\-]{52})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:dnkey)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}(dnkey-[a-z0-9=_\-]{26}-[a-z0-9=_\-]{52})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/digitalocean-access-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)\b(doo_v1_[a-f0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: (\b(doo_v1_[a-f0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/digitalocean-pat.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)\b(dop_v1_[a-f0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: (\b(dop_v1_[a-f0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/digitalocean-refresh-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)\b(dor_v1_[a-f0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)\b(dor_v1_[a-f0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$))

generic/secrets/gitleaks/discord-api-token.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:discord)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-f0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: ((?i)[\w.-]{0,50}?(?:discord)(?:[ \t\w.-]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-f0-9]{64})(?:['|\"|\n|\r|\s|\x60|;]|$))

0 commit comments

Comments
 (0)