|
|
@@ -11,8 +11,8 @@ func OktaAccessToken() *config.Rule {
|
|
|
r := config.Rule{
|
|
|
RuleID: "okta-access-token",
|
|
|
Description: "Identified an Okta Access Token, which may compromise identity management services and user authentication data.",
|
|
|
- Regex: utils.GenerateSemiGenericRegex([]string{"okta"}, utils.AlphaNumericExtended("42"), true),
|
|
|
- Entropy: 3,
|
|
|
+ Regex: utils.GenerateSemiGenericRegex([]string{`(?-i:[Oo]kta|OKTA)`}, `00[\w=\-]{40}`, false),
|
|
|
+ Entropy: 4,
|
|
|
Keywords: []string{
|
|
|
"okta",
|
|
|
},
|
|
|
@@ -20,10 +20,15 @@ func OktaAccessToken() *config.Rule {
|
|
|
|
|
|
// validate
|
|
|
tps := []string{
|
|
|
- utils.GenerateSampleSecret("okta", secrets.NewSecret(utils.AlphaNumeric("42"))),
|
|
|
+ utils.GenerateSampleSecret("okta", secrets.NewSecret(`00[\w=\-]{40}`)),
|
|
|
+ `"oktaApiToken": "00ebObu4zSNkyc6dimLvUwq4KpTEop-PCEnnfSTpD3",`, // gitleaks:allow
|
|
|
+ ` var OktaApiToken = "00fWkOjwwL9xiFd-Vfgm_ePATIRxVj852Iblbb1DS_";`, // gitleaks:allow
|
|
|
}
|
|
|
fps := []string{
|
|
|
- "00000000000000000000000000000000000TUVWXYZ",
|
|
|
+ `oktaKey = 00000000000000000000000000000000000TUVWXYZ`, // low entropy
|
|
|
+ `rookTable = 0023452Lllk2KqjLBvaxANWEgTd7bqjsxjo8aZj0wd`, // wrong case
|
|
|
}
|
|
|
return utils.Validate(r, tps, fps)
|
|
|
}
|
|
|
+
|
|
|
+// TODO: Okta client secret?
|