Skip to content

Commit 6dd31dc

Browse files
author
Security Research (r2c-argo)
committed
Merge Gitleaks rules 2024-10-01 # 00:32
1 parent ecba02c commit 6dd31dc

22 files changed

Lines changed: 97 additions & 19 deletions

generic/secrets/gitleaks/clojars-api-token.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(CLOJARS_)[a-z0-9]{60}
26+
- pattern-regex: (?i)CLOJARS_[a-z0-9]{60}

generic/secrets/gitleaks/doppler-api-token.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (dp\.pt\.)(?i)[a-z0-9]{43}
26+
- pattern-regex: dp\.pt\.(?i)[a-z0-9]{43}

generic/secrets/gitleaks/duffel-api-token.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: duffel_(test|live)_(?i)[a-z0-9_\-=]{43}
26+
- pattern-regex: duffel_(?:test|live)_(?i)[a-z0-9_\-=]{43}

generic/secrets/gitleaks/etsy-access-token.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)(?:etsy)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{24})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: (?i)(?:(?-i:ETSY|[Ee]tsy))(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{24})(?:['|\"|\n|\r|\s|\x60|;]|$)
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
rules:
2+
- id: flyio-access-token
3+
message: A gitleaks flyio-access-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
4+
languages:
5+
- regex
6+
severity: INFO
7+
metadata:
8+
likelihood: LOW
9+
impact: MEDIUM
10+
confidence: LOW
11+
category: security
12+
cwe:
13+
- "CWE-798: Use of Hard-coded Credentials"
14+
cwe2021-top25: true
15+
cwe2022-top25: true
16+
owasp:
17+
- A07:2021 - Identification and Authentication Failures
18+
references:
19+
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
20+
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
21+
subcategory:
22+
- vuln
23+
technology:
24+
- gitleaks
25+
patterns:
26+
- pattern-regex: \b((?:fo1_[\w-]{43}|fm1[ar]_[a-zA-Z0-9+\/]{100,}={0,3}|fm2_[a-zA-Z0-9+\/]{100,}={0,3}))(?:['|\"|\n|\r|\s|\x60|;]|$)

generic/secrets/gitleaks/gcp-api-key.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)\b(AIza[0-9A-Za-z\\-_]{35})(?:['|\"|\n|\r|\s|\x60|;]|$)
26+
- pattern-regex: \b(AIza[\w-]{35})(?:['|\"|\n|\r|\s|\x60|;]|$)

generic/secrets/gitleaks/github-app-token.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (ghu|ghs)_[0-9a-zA-Z]{36}
26+
- pattern-regex: (?:ghu|ghs)_[0-9a-zA-Z]{36}

generic/secrets/gitleaks/github-fine-grained-pat.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: github_pat_[0-9a-zA-Z_]{82}
26+
- pattern-regex: github_pat_\w{82}

generic/secrets/gitleaks/harness-api-key.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: ((?:pat|sat)\.[a-zA-Z0-9]{22}\.[a-zA-Z0-9]{24}\.[a-zA-Z0-9]{20})
26+
- pattern-regex: (?:pat|sat)\.[a-zA-Z0-9_-]{22}\.[a-zA-Z0-9]{24}\.[a-zA-Z0-9]{20}

generic/secrets/gitleaks/hashicorp-tf-api-token.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ rules:
2323
technology:
2424
- gitleaks
2525
patterns:
26-
- pattern-regex: (?i)[a-z0-9]{14}\.atlasv1\.[a-z0-9\-_=]{60,70}
26+
- pattern-regex: (?i)[a-z0-9]{14}\.(?-i:atlasv1)\.[a-z0-9\-_=]{60,70}

0 commit comments

Comments
 (0)