|
@@ -13,14 +13,22 @@ func EasyPost() *config.Rule {
|
|
|
r := config.Rule{
|
|
r := config.Rule{
|
|
|
RuleID: "easypost-api-token",
|
|
RuleID: "easypost-api-token",
|
|
|
Description: "Identified an EasyPost API token, which could lead to unauthorized postal and shipment service access and data exposure.",
|
|
Description: "Identified an EasyPost API token, which could lead to unauthorized postal and shipment service access and data exposure.",
|
|
|
- Regex: regexp.MustCompile(`\bEZAK(?i)[a-z0-9]{54}`),
|
|
|
|
|
|
|
+ Regex: regexp.MustCompile(`\bEZAK(?i)[a-z0-9]{54}\b`),
|
|
|
Entropy: 2,
|
|
Entropy: 2,
|
|
|
Keywords: []string{"EZAK"},
|
|
Keywords: []string{"EZAK"},
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
// validate
|
|
// validate
|
|
|
- tps := utils.GenerateSampleSecrets("EZAK", "EZAK"+secrets.NewSecret(utils.AlphaNumeric("54")))
|
|
|
|
|
- return utils.Validate(r, tps, nil)
|
|
|
|
|
|
|
+ tps := utils.GenerateSampleSecrets("EZAK", "EZAK"+secrets.NewSecret(`[a-zA-Z0-9]{54}`))
|
|
|
|
|
+ tps = append(tps,
|
|
|
|
|
+ "EZAK"+secrets.NewSecret(`[a-zA-Z0-9]{54}`),
|
|
|
|
|
+ "example.com?t=EZAK"+secrets.NewSecret(`[a-zA-Z0-9]{54}`)+"&q=1",
|
|
|
|
|
+ )
|
|
|
|
|
+ fps := []string{
|
|
|
|
|
+ // random base64 encoded string
|
|
|
|
|
+ `...6wqX6fNUXA/rYqRvfQ+EZAKGqQRiRyqAFRQshGPWOIAwNWGORfKHSBnVNFtVmWYoW6PH23lkqbbDWep95C/3VmWq/edti6...`, // gitleaks:allow
|
|
|
|
|
+ }
|
|
|
|
|
+ return utils.Validate(r, tps, fps)
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
func EasyPostTestAPI() *config.Rule {
|
|
func EasyPostTestAPI() *config.Rule {
|
|
@@ -28,12 +36,21 @@ func EasyPostTestAPI() *config.Rule {
|
|
|
r := config.Rule{
|
|
r := config.Rule{
|
|
|
RuleID: "easypost-test-api-token",
|
|
RuleID: "easypost-test-api-token",
|
|
|
Description: "Detected an EasyPost test API token, risking exposure of test environments and potentially sensitive shipment data.",
|
|
Description: "Detected an EasyPost test API token, risking exposure of test environments and potentially sensitive shipment data.",
|
|
|
- Regex: regexp.MustCompile(`\bEZTK(?i)[a-z0-9]{54}`),
|
|
|
|
|
|
|
+ Regex: regexp.MustCompile(`\bEZTK(?i)[a-z0-9]{54}\b`),
|
|
|
Entropy: 2,
|
|
Entropy: 2,
|
|
|
Keywords: []string{"EZTK"},
|
|
Keywords: []string{"EZTK"},
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
// validate
|
|
// validate
|
|
|
- tps := utils.GenerateSampleSecrets("EZTK", "EZTK"+secrets.NewSecret(utils.AlphaNumeric("54")))
|
|
|
|
|
- return utils.Validate(r, tps, nil)
|
|
|
|
|
|
|
+ tps := utils.GenerateSampleSecrets("EZTK", secrets.NewSecret(`EZTK[a-zA-Z0-9]{54}`))
|
|
|
|
|
+ tps = append(tps, secrets.NewSecret(`EZTK[a-zA-Z0-9]{54}`))
|
|
|
|
|
+ tps = append(tps,
|
|
|
|
|
+ "EZTK"+secrets.NewSecret(`[a-zA-Z0-9]{54}`),
|
|
|
|
|
+ "example.com?t=EZTK"+secrets.NewSecret(`[a-zA-Z0-9]{54}`)+"&q=1",
|
|
|
|
|
+ )
|
|
|
|
|
+ fps := []string{
|
|
|
|
|
+ // random base64 encoded string
|
|
|
|
|
+ `...6wqX6fNUXA/rYqRvfQ+EZTKGqQRiRyqAFRQshGPWOIAwNWGORfKHSBnVNFtVmWYoW6PH23lkqbbDWep95C/3VmWq/edti6...`, // gitleaks:allow
|
|
|
|
|
+ }
|
|
|
|
|
+ return utils.Validate(r, tps, fps)
|
|
|
}
|
|
}
|