Explorar o código

Enhance Secret Descriptions (#1300)

* Enhance secret descriptions in gitleaks.toml

* adjust the rule configuration descriptions

* missing spaces in gitleaks.toml
Liron Biam %!s(int64=2) %!d(string=hai) anos
pai
achega
8de8938ad4
Modificáronse 100 ficheiros con 159 adicións e 159 borrados
  1. 1 1
      cmd/generate/config/rules/adafruit.go
  2. 2 2
      cmd/generate/config/rules/adobe.go
  3. 1 1
      cmd/generate/config/rules/age.go
  4. 1 1
      cmd/generate/config/rules/airtable.go
  5. 1 1
      cmd/generate/config/rules/algolia.go
  6. 2 2
      cmd/generate/config/rules/alibaba.go
  7. 2 2
      cmd/generate/config/rules/asana.go
  8. 1 1
      cmd/generate/config/rules/atlassian.go
  9. 1 1
      cmd/generate/config/rules/authress.go
  10. 1 1
      cmd/generate/config/rules/aws.go
  11. 1 1
      cmd/generate/config/rules/beamer.go
  12. 2 2
      cmd/generate/config/rules/bitbucket.go
  13. 2 2
      cmd/generate/config/rules/bittrex.go
  14. 1 1
      cmd/generate/config/rules/clojars.go
  15. 1 1
      cmd/generate/config/rules/codecov.go
  16. 1 1
      cmd/generate/config/rules/coinbase.go
  17. 2 2
      cmd/generate/config/rules/confluent.go
  18. 1 1
      cmd/generate/config/rules/contentful.go
  19. 1 1
      cmd/generate/config/rules/databricks.go
  20. 1 1
      cmd/generate/config/rules/datadog.go
  21. 1 1
      cmd/generate/config/rules/definednetworking.go
  22. 3 3
      cmd/generate/config/rules/digitalocean.go
  23. 3 3
      cmd/generate/config/rules/discord.go
  24. 1 1
      cmd/generate/config/rules/doppler.go
  25. 1 1
      cmd/generate/config/rules/droneci.go
  26. 3 3
      cmd/generate/config/rules/dropbox.go
  27. 1 1
      cmd/generate/config/rules/duffel.go
  28. 1 1
      cmd/generate/config/rules/dynatrace.go
  29. 2 2
      cmd/generate/config/rules/easypost.go
  30. 1 1
      cmd/generate/config/rules/etsy.go
  31. 1 1
      cmd/generate/config/rules/facebook.go
  32. 1 1
      cmd/generate/config/rules/fastly.go
  33. 2 2
      cmd/generate/config/rules/finicity.go
  34. 1 1
      cmd/generate/config/rules/finnhub.go
  35. 1 1
      cmd/generate/config/rules/flickr.go
  36. 3 3
      cmd/generate/config/rules/flutterwave.go
  37. 1 1
      cmd/generate/config/rules/frameio.go
  38. 1 1
      cmd/generate/config/rules/freshbooks.go
  39. 1 1
      cmd/generate/config/rules/gcp.go
  40. 1 1
      cmd/generate/config/rules/generic.go
  41. 5 5
      cmd/generate/config/rules/github.go
  42. 3 3
      cmd/generate/config/rules/gitlab.go
  43. 1 1
      cmd/generate/config/rules/gitter.go
  44. 1 1
      cmd/generate/config/rules/gocardless.go
  45. 3 3
      cmd/generate/config/rules/grafana.go
  46. 2 2
      cmd/generate/config/rules/hashicorp.go
  47. 1 1
      cmd/generate/config/rules/heroku.go
  48. 1 1
      cmd/generate/config/rules/hubspot.go
  49. 2 2
      cmd/generate/config/rules/huggingface.go
  50. 1 1
      cmd/generate/config/rules/infracost.go
  51. 1 1
      cmd/generate/config/rules/intercom.go
  52. 2 2
      cmd/generate/config/rules/jfrog.go
  53. 2 2
      cmd/generate/config/rules/jwt.go
  54. 1 1
      cmd/generate/config/rules/kraken.go
  55. 2 2
      cmd/generate/config/rules/kucoin.go
  56. 1 1
      cmd/generate/config/rules/launchdarkly.go
  57. 2 2
      cmd/generate/config/rules/linear.go
  58. 2 2
      cmd/generate/config/rules/linkedin.go
  59. 2 2
      cmd/generate/config/rules/lob.go
  60. 1 1
      cmd/generate/config/rules/mailchimp.go
  61. 3 3
      cmd/generate/config/rules/mailgun.go
  62. 1 1
      cmd/generate/config/rules/mapbox.go
  63. 1 1
      cmd/generate/config/rules/mattermost.go
  64. 2 2
      cmd/generate/config/rules/messagebird.go
  65. 1 1
      cmd/generate/config/rules/netlify.go
  66. 3 3
      cmd/generate/config/rules/newrelic.go
  67. 1 1
      cmd/generate/config/rules/npm.go
  68. 1 1
      cmd/generate/config/rules/nytimes.go
  69. 1 1
      cmd/generate/config/rules/okta.go
  70. 1 1
      cmd/generate/config/rules/openai.go
  71. 3 3
      cmd/generate/config/rules/plaid.go
  72. 3 3
      cmd/generate/config/rules/planetscale.go
  73. 1 1
      cmd/generate/config/rules/postman.go
  74. 1 1
      cmd/generate/config/rules/prefect.go
  75. 1 1
      cmd/generate/config/rules/privatekey.go
  76. 1 1
      cmd/generate/config/rules/pulumi.go
  77. 1 1
      cmd/generate/config/rules/pypi.go
  78. 1 1
      cmd/generate/config/rules/rapidapi.go
  79. 1 1
      cmd/generate/config/rules/readme.go
  80. 1 1
      cmd/generate/config/rules/rubygems.go
  81. 1 1
      cmd/generate/config/rules/scalingo.go
  82. 2 2
      cmd/generate/config/rules/sendbird.go
  83. 1 1
      cmd/generate/config/rules/sendgrid.go
  84. 1 1
      cmd/generate/config/rules/sendinblue.go
  85. 1 1
      cmd/generate/config/rules/sentry.go
  86. 1 1
      cmd/generate/config/rules/shippo.go
  87. 4 4
      cmd/generate/config/rules/shopify.go
  88. 2 2
      cmd/generate/config/rules/sidekiq.go
  89. 9 9
      cmd/generate/config/rules/slack.go
  90. 1 1
      cmd/generate/config/rules/snyk.go
  91. 1 1
      cmd/generate/config/rules/square.go
  92. 1 1
      cmd/generate/config/rules/squarespace.go
  93. 1 1
      cmd/generate/config/rules/stripe.go
  94. 2 2
      cmd/generate/config/rules/sumologic.go
  95. 1 1
      cmd/generate/config/rules/teams.go
  96. 1 1
      cmd/generate/config/rules/telegram.go
  97. 1 1
      cmd/generate/config/rules/travisci.go
  98. 1 1
      cmd/generate/config/rules/twilio.go
  99. 1 1
      cmd/generate/config/rules/twitch.go
  100. 5 5
      cmd/generate/config/rules/twitter.go

+ 1 - 1
cmd/generate/config/rules/adafruit.go

@@ -8,7 +8,7 @@ import (
 func AdafruitAPIKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Adafruit API Key",
+		Description: "Identified a potential Adafruit API Key, which could lead to unauthorized access to Adafruit services and sensitive data exposure.",
 		RuleID:      "adafruit-api-key",
 		Regex:       generateSemiGenericRegex([]string{"adafruit"}, alphaNumericExtendedShort("32"), true),
 		Keywords:    []string{"adafruit"},

+ 2 - 2
cmd/generate/config/rules/adobe.go

@@ -8,7 +8,7 @@ import (
 func AdobeClientID() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Adobe Client ID (OAuth Web)",
+		Description: "Detected a pattern that resembles an Adobe OAuth Web Client ID, posing a risk of compromised Adobe integrations and data breaches.",
 		RuleID:      "adobe-client-id",
 		Regex:       generateSemiGenericRegex([]string{"adobe"}, hex("32"), true),
 		Keywords:    []string{"adobe"},
@@ -24,7 +24,7 @@ func AdobeClientID() *config.Rule {
 func AdobeClientSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Adobe Client Secret",
+		Description: "Discovered a potential Adobe Client Secret, which, if exposed, could allow unauthorized Adobe service access and data manipulation.",
 		RuleID:      "adobe-client-secret",
 		Regex:       generateUniqueTokenRegex(`(p8e-)(?i)[a-z0-9]{32}`, true),
 		Keywords:    []string{"p8e-"},

+ 1 - 1
cmd/generate/config/rules/age.go

@@ -9,7 +9,7 @@ import (
 func AgeSecretKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Age secret key",
+		Description: "Discovered a potential Age encryption tool secret key, risking data decryption and unauthorized access to sensitive information.",
 		RuleID:      "age secret key",
 		Regex:       regexp.MustCompile(`AGE-SECRET-KEY-1[QPZRY9X8GF2TVDW0S3JN54KHCE6MUA7L]{58}`),
 		Keywords:    []string{"AGE-SECRET-KEY-1"},

+ 1 - 1
cmd/generate/config/rules/airtable.go

@@ -8,7 +8,7 @@ import (
 func Airtable() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Airtable API Key",
+		Description: "Uncovered a possible Airtable API Key, potentially compromising database access and leading to data leakage or alteration.",
 		RuleID:      "airtable-api-key",
 		Regex:       generateSemiGenericRegex([]string{"airtable"}, alphaNumeric("17"), true),
 		Keywords:    []string{"airtable"},

+ 1 - 1
cmd/generate/config/rules/algolia.go

@@ -8,7 +8,7 @@ import (
 func AlgoliaApiKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Algolia API Key",
+		Description: "Identified an Algolia API Key, which could result in unauthorized search operations and data exposure on Algolia-managed platforms.",
 		RuleID:      "algolia-api-key",
 		Regex:       generateSemiGenericRegex([]string{"algolia"}, `[a-z0-9]{32}`, true),
 		Keywords:    []string{"algolia"},

+ 2 - 2
cmd/generate/config/rules/alibaba.go

@@ -8,7 +8,7 @@ import (
 func AlibabaAccessKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Alibaba AccessKey ID",
+		Description: "Detected an Alibaba Cloud AccessKey ID, posing a risk of unauthorized cloud resource access and potential data compromise.",
 		RuleID:      "alibaba-access-key-id",
 		Regex:       generateUniqueTokenRegex(`(LTAI)(?i)[a-z0-9]{20}`, true),
 		Keywords:    []string{"LTAI"},
@@ -25,7 +25,7 @@ func AlibabaAccessKey() *config.Rule {
 func AlibabaSecretKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Alibaba Secret Key",
+		Description: "Discovered a potential Alibaba Cloud Secret Key, potentially allowing unauthorized operations and data access within Alibaba Cloud.",
 		RuleID:      "alibaba-secret-key",
 		Regex: generateSemiGenericRegex([]string{"alibaba"},
 			alphaNumeric("30"), true),

+ 2 - 2
cmd/generate/config/rules/asana.go

@@ -8,7 +8,7 @@ import (
 func AsanaClientID() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Asana Client ID",
+		Description: "Discovered a potential Asana Client ID, risking unauthorized access to Asana projects and sensitive task information.",
 		RuleID:      "asana-client-id",
 		Regex:       generateSemiGenericRegex([]string{"asana"}, numeric("16"), true),
 		Keywords:    []string{"asana"},
@@ -24,7 +24,7 @@ func AsanaClientID() *config.Rule {
 func AsanaClientSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Asana Client Secret",
+		Description: "Identified an Asana Client Secret, which could lead to compromised project management integrity and unauthorized access.",
 		RuleID:      "asana-client-secret",
 		Regex:       generateSemiGenericRegex([]string{"asana"}, alphaNumeric("32"), true),
 

+ 1 - 1
cmd/generate/config/rules/atlassian.go

@@ -8,7 +8,7 @@ import (
 func Atlassian() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Atlassian API token",
+		Description: "Detected an Atlassian API token, posing a threat to project management and collaboration tool security and data confidentiality.",
 		RuleID:      "atlassian-api-token",
 		Regex: generateSemiGenericRegex([]string{
 			"atlassian", "confluence", "jira"}, alphaNumeric("24"), true),

+ 1 - 1
cmd/generate/config/rules/authress.go

@@ -11,7 +11,7 @@ func Authress() *config.Rule {
 	// Rule Definition
 	// (Note: When changes are made to this, rerun `go generate ./...` and commit the config/gitleaks.toml file
 	r := config.Rule{
-		Description: "Authress Service Client Access Key",
+		Description: "Uncovered a possible Authress Service Client Access Key, which may compromise access control services and sensitive data.",
 		RuleID:      "authress-service-client-access-key",
 		Regex:       generateUniqueTokenRegex(`(?:sc|ext|scauth|authress)_[a-z0-9]{5,30}\.[a-z0-9]{4,6}\.acc[_-][a-z0-9-]{10,32}\.[a-z0-9+/_=-]{30,120}`, true),
 		Keywords:    []string{"sc_", "ext_", "scauth_", "authress_"},

+ 1 - 1
cmd/generate/config/rules/aws.go

@@ -9,7 +9,7 @@ import (
 func AWS() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "AWS",
+		Description: "Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.",
 		RuleID:      "aws-access-token",
 		Regex: regexp.MustCompile(
 			"(?:A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}"),

+ 1 - 1
cmd/generate/config/rules/beamer.go

@@ -8,7 +8,7 @@ import (
 func Beamer() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Beamer API token",
+		Description: "Detected a Beamer API token, potentially compromising content management and exposing sensitive notifications and updates.",
 		RuleID:      "beamer-api-token",
 		Regex: generateSemiGenericRegex([]string{"beamer"},
 			`b_[a-z0-9=_\-]{44}`, true),

+ 2 - 2
cmd/generate/config/rules/bitbucket.go

@@ -8,7 +8,7 @@ import (
 func BitBucketClientID() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Bitbucket Client ID",
+		Description: "Discovered a potential Bitbucket Client ID, risking unauthorized repository access and potential codebase exposure.",
 		RuleID:      "bitbucket-client-id",
 		Regex:       generateSemiGenericRegex([]string{"bitbucket"}, alphaNumeric("32"), true),
 		Keywords:    []string{"bitbucket"},
@@ -24,7 +24,7 @@ func BitBucketClientID() *config.Rule {
 func BitBucketClientSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Bitbucket Client Secret",
+		Description: "Discovered a potential Bitbucket Client Secret, posing a risk of compromised code repositories and unauthorized access.",
 		RuleID:      "bitbucket-client-secret",
 		Regex:       generateSemiGenericRegex([]string{"bitbucket"}, alphaNumericExtended("64"), true),
 

+ 2 - 2
cmd/generate/config/rules/bittrex.go

@@ -8,7 +8,7 @@ import (
 func BittrexAccessKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Bittrex Access Key",
+		Description: "Identified a Bittrex Access Key, which could lead to unauthorized access to cryptocurrency trading accounts and financial loss.",
 		RuleID:      "bittrex-access-key",
 		Regex:       generateSemiGenericRegex([]string{"bittrex"}, alphaNumeric("32"), true),
 		Keywords:    []string{"bittrex"},
@@ -24,7 +24,7 @@ func BittrexAccessKey() *config.Rule {
 func BittrexSecretKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Bittrex Secret Key",
+		Description: "Detected a Bittrex Secret Key, potentially compromising cryptocurrency transactions and financial security.",
 		RuleID:      "bittrex-secret-key",
 		Regex:       generateSemiGenericRegex([]string{"bittrex"}, alphaNumeric("32"), true),
 

+ 1 - 1
cmd/generate/config/rules/clojars.go

@@ -10,7 +10,7 @@ import (
 func Clojars() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Clojars API token",
+		Description: "Uncovered a possible Clojars API token, risking unauthorized access to Clojure libraries and potential code manipulation.",
 		RuleID:      "clojars-api-token",
 		Regex:       regexp.MustCompile(`(?i)(CLOJARS_)[a-z0-9]{60}`),
 		Keywords:    []string{"clojars"},

+ 1 - 1
cmd/generate/config/rules/codecov.go

@@ -9,7 +9,7 @@ func CodecovAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "codecov-access-token",
-		Description: "Codecov Access Token",
+		Description: "Found a pattern resembling a Codecov Access Token, posing a risk of unauthorized access to code coverage reports and sensitive data.",
 		Regex:       generateSemiGenericRegex([]string{"codecov"}, alphaNumeric("32"), true),
 		Keywords: []string{
 			"codecov",

+ 1 - 1
cmd/generate/config/rules/coinbase.go

@@ -9,7 +9,7 @@ func CoinbaseAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "coinbase-access-token",
-		Description: "Coinbase Access Token",
+		Description: "Detected a Coinbase Access Token, posing a risk of unauthorized access to cryptocurrency accounts and financial transactions.",
 		Regex: generateSemiGenericRegex([]string{"coinbase"},
 			alphaNumericExtendedShort("64"), true),
 		Keywords: []string{

+ 2 - 2
cmd/generate/config/rules/confluent.go

@@ -9,7 +9,7 @@ func ConfluentSecretKey() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "confluent-secret-key",
-		Description: "Confluent Secret Key",
+		Description: "Found a Confluent Secret Key, potentially risking unauthorized operations and data access within Confluent services.",
 		Regex:       generateSemiGenericRegex([]string{"confluent"}, alphaNumeric("64"), true),
 		Keywords: []string{
 			"confluent",
@@ -27,7 +27,7 @@ func ConfluentAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "confluent-access-token",
-		Description: "Confluent Access Token",
+		Description: "Identified a Confluent Access Token, which could compromise access to streaming data platforms and sensitive data flow.",
 		Regex:       generateSemiGenericRegex([]string{"confluent"}, alphaNumeric("16"), true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/contentful.go

@@ -8,7 +8,7 @@ import (
 func Contentful() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Contentful delivery API token",
+		Description: "Discovered a Contentful delivery API token, posing a risk to content management systems and data integrity.",
 		RuleID:      "contentful-delivery-api-token",
 		Regex: generateSemiGenericRegex([]string{"contentful"},
 			alphaNumericExtended("43"), true),

+ 1 - 1
cmd/generate/config/rules/databricks.go

@@ -8,7 +8,7 @@ import (
 func Databricks() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Databricks API token",
+		Description: "Uncovered a Databricks API token, which may compromise big data analytics platforms and sensitive data processing.",
 		RuleID:      "databricks-api-token",
 		Regex:       generateUniqueTokenRegex(`dapi[a-h0-9]{32}`, true),
 		Keywords:    []string{"dapi"},

+ 1 - 1
cmd/generate/config/rules/datadog.go

@@ -9,7 +9,7 @@ func DatadogtokenAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "datadog-access-token",
-		Description: "Datadog Access Token",
+		Description: "Detected a Datadog Access Token, potentially risking monitoring and analytics data exposure and manipulation.",
 		Regex: generateSemiGenericRegex([]string{"datadog"},
 			alphaNumeric("40"), true),
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/definednetworking.go

@@ -9,7 +9,7 @@ func DefinedNetworkingAPIToken() *config.Rule {
 	// Define Rule
 	r := config.Rule{
 		// Human redable description of the rule
-		Description: "Defined Networking API token",
+		Description: "Identified a Defined Networking API token, which could lead to unauthorized network operations and data breaches.",
 
 		// Unique ID for the rule
 		RuleID: "defined-networking-api-token",

+ 3 - 3
cmd/generate/config/rules/digitalocean.go

@@ -7,7 +7,7 @@ import (
 
 func DigitalOceanPAT() *config.Rule {
 	r := config.Rule{
-		Description: "DigitalOcean Personal Access Token",
+		Description: "Discovered a DigitalOcean Personal Access Token, posing a threat to cloud infrastructure security and data privacy.",
 		RuleID:      "digitalocean-pat",
 		Regex:       generateUniqueTokenRegex(`dop_v1_[a-f0-9]{64}`, true),
 		Keywords:    []string{"dop_v1_"},
@@ -21,7 +21,7 @@ func DigitalOceanPAT() *config.Rule {
 
 func DigitalOceanOAuthToken() *config.Rule {
 	r := config.Rule{
-		Description: "DigitalOcean OAuth Access Token",
+		Description: "Found a DigitalOcean OAuth Access Token, risking unauthorized cloud resource access and data compromise.",
 		RuleID:      "digitalocean-access-token",
 
 		Regex:    generateUniqueTokenRegex(`doo_v1_[a-f0-9]{64}`, true),
@@ -36,7 +36,7 @@ func DigitalOceanOAuthToken() *config.Rule {
 
 func DigitalOceanRefreshToken() *config.Rule {
 	r := config.Rule{
-		Description: "DigitalOcean OAuth Refresh Token",
+		Description: "Uncovered a DigitalOcean OAuth Refresh Token, which could allow prolonged unauthorized access and resource manipulation.",
 		RuleID:      "digitalocean-refresh-token",
 
 		Regex:    generateUniqueTokenRegex(`dor_v1_[a-f0-9]{64}`, true),

+ 3 - 3
cmd/generate/config/rules/discord.go

@@ -8,7 +8,7 @@ import (
 func DiscordAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Discord API key",
+		Description: "Detected a Discord API key, potentially compromising communication channels and user data privacy on Discord.",
 		RuleID:      "discord-api-token",
 		Regex:       generateSemiGenericRegex([]string{"discord"}, hex("64"), true),
 		Keywords:    []string{"discord"},
@@ -24,7 +24,7 @@ func DiscordAPIToken() *config.Rule {
 func DiscordClientID() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Discord client ID",
+		Description: "Identified a Discord client ID, which may lead to unauthorized integrations and data exposure in Discord applications.",
 		RuleID:      "discord-client-id",
 		Regex:       generateSemiGenericRegex([]string{"discord"}, numeric("18"), true),
 		Keywords:    []string{"discord"},
@@ -40,7 +40,7 @@ func DiscordClientID() *config.Rule {
 func DiscordClientSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Discord client secret",
+		Description: "Discovered a potential Discord client secret, risking compromised Discord bot integrations and data leaks.",
 		RuleID:      "discord-client-secret",
 		Regex:       generateSemiGenericRegex([]string{"discord"}, alphaNumericExtended("32"), true),
 		Keywords:    []string{"discord"},

+ 1 - 1
cmd/generate/config/rules/doppler.go

@@ -10,7 +10,7 @@ import (
 func Doppler() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Doppler API token",
+		Description: "Discovered a Doppler API token, posing a risk to environment and secrets management security.",
 		RuleID:      "doppler-api-token",
 		Regex:       regexp.MustCompile(`(dp\.pt\.)(?i)[a-z0-9]{43}`),
 		Keywords:    []string{"doppler"},

+ 1 - 1
cmd/generate/config/rules/droneci.go

@@ -9,7 +9,7 @@ func DroneciAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "droneci-access-token",
-		Description: "Droneci Access Token",
+		Description: "Detected a Droneci Access Token, potentially compromising continuous integration and deployment workflows.",
 		Regex:       generateSemiGenericRegex([]string{"droneci"}, alphaNumeric("32"), true),
 
 		Keywords: []string{

+ 3 - 3
cmd/generate/config/rules/dropbox.go

@@ -8,7 +8,7 @@ import (
 func DropBoxAPISecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Dropbox API secret",
+		Description: "Identified a Dropbox API secret, which could lead to unauthorized file access and data breaches in Dropbox storage.",
 		RuleID:      "dropbox-api-token",
 		Regex:       generateSemiGenericRegex([]string{"dropbox"}, alphaNumeric("15"), true),
 
@@ -26,7 +26,7 @@ func DropBoxShortLivedAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "dropbox-short-lived-api-token",
-		Description: "Dropbox short lived API token",
+		Description: "Discovered a Dropbox short-lived API token, posing a risk of temporary but potentially harmful data access and manipulation.",
 		Regex:       generateSemiGenericRegex([]string{"dropbox"}, `sl\.[a-z0-9\-=_]{135}`, true),
 		Keywords:    []string{"dropbox"},
 	}
@@ -39,7 +39,7 @@ func DropBoxLongLivedAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "dropbox-long-lived-api-token",
-		Description: "Dropbox long lived API token",
+		Description: "Found a Dropbox long-lived API token, risking prolonged unauthorized access to cloud storage and sensitive data.",
 		Regex:       generateSemiGenericRegex([]string{"dropbox"}, `[a-z0-9]{11}(AAAAAAAAAA)[a-z0-9\-_=]{43}`, true),
 		Keywords:    []string{"dropbox"},
 	}

+ 1 - 1
cmd/generate/config/rules/duffel.go

@@ -11,7 +11,7 @@ func Duffel() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "duffel-api-token",
-		Description: "Duffel API token",
+		Description: "Uncovered a Duffel API token, which may compromise travel platform integrations and sensitive customer data.",
 		Regex:       regexp.MustCompile(`duffel_(test|live)_(?i)[a-z0-9_\-=]{43}`),
 		Keywords:    []string{"duffel"},
 	}

+ 1 - 1
cmd/generate/config/rules/dynatrace.go

@@ -10,7 +10,7 @@ import (
 func Dynatrace() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Dynatrace API token",
+		Description: "Detected a Dynatrace API token, potentially risking application performance monitoring and data exposure.",
 		RuleID:      "dynatrace-api-token",
 		Regex:       regexp.MustCompile(`dt0c01\.(?i)[a-z0-9]{24}\.[a-z0-9]{64}`),
 		Keywords:    []string{"dynatrace"},

+ 2 - 2
cmd/generate/config/rules/easypost.go

@@ -10,7 +10,7 @@ import (
 func EasyPost() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "EasyPost API token",
+		Description: "Identified an EasyPost API token, which could lead to unauthorized postal and shipment service access and data exposure.",
 		RuleID:      "easypost-api-token",
 		Regex:       regexp.MustCompile(`\bEZAK(?i)[a-z0-9]{54}`),
 		Keywords:    []string{"EZAK"},
@@ -26,7 +26,7 @@ func EasyPost() *config.Rule {
 func EasyPostTestAPI() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "EasyPost test API token",
+		Description: "Detected an EasyPost test API token, risking exposure of test environments and potentially sensitive shipment data.",
 		RuleID:      "easypost-test-api-token",
 		Regex:       regexp.MustCompile(`\bEZTK(?i)[a-z0-9]{54}`),
 		Keywords:    []string{"EZTK"},

+ 1 - 1
cmd/generate/config/rules/etsy.go

@@ -9,7 +9,7 @@ func EtsyAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "etsy-access-token",
-		Description: "Etsy Access Token",
+		Description: "Found an Etsy Access Token, potentially compromising Etsy shop management and customer data.",
 		Regex:       generateSemiGenericRegex([]string{"etsy"}, alphaNumeric("24"), true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/facebook.go

@@ -8,7 +8,7 @@ import (
 func Facebook() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Facebook Access Token",
+		Description: "Discovered a Facebook Access Token, posing a risk of unauthorized access to Facebook accounts and personal data exposure.",
 		RuleID:      "facebook",
 		Regex:       generateSemiGenericRegex([]string{"facebook"}, hex("32"), true),
 

+ 1 - 1
cmd/generate/config/rules/fastly.go

@@ -8,7 +8,7 @@ import (
 func FastlyAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Fastly API key",
+		Description: "Uncovered a Fastly API key, which may compromise CDN and edge cloud services, leading to content delivery and security issues.",
 		RuleID:      "fastly-api-token",
 		Regex:       generateSemiGenericRegex([]string{"fastly"}, alphaNumericExtended("32"), true),
 

+ 2 - 2
cmd/generate/config/rules/finicity.go

@@ -8,7 +8,7 @@ import (
 func FinicityClientSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Finicity Client Secret",
+		Description: "Identified a Finicity Client Secret, which could lead to compromised financial service integrations and data breaches.",
 		RuleID:      "finicity-client-secret",
 		Regex:       generateSemiGenericRegex([]string{"finicity"}, alphaNumeric("20"), true),
 
@@ -25,7 +25,7 @@ func FinicityClientSecret() *config.Rule {
 func FinicityAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Finicity API token",
+		Description: "Detected a Finicity API token, potentially risking financial data access and unauthorized financial operations.",
 		RuleID:      "finicity-api-token",
 		Regex:       generateSemiGenericRegex([]string{"finicity"}, hex("32"), true),
 

+ 1 - 1
cmd/generate/config/rules/finnhub.go

@@ -9,7 +9,7 @@ func FinnhubAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "finnhub-access-token",
-		Description: "Finnhub Access Token",
+		Description: "Found a Finnhub Access Token, risking unauthorized access to financial market data and analytics.",
 		Regex:       generateSemiGenericRegex([]string{"finnhub"}, alphaNumeric("20"), true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/flickr.go

@@ -9,7 +9,7 @@ func FlickrAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "flickr-access-token",
-		Description: "Flickr Access Token",
+		Description: "Discovered a Flickr Access Token, posing a risk of unauthorized photo management and potential data leakage.",
 		Regex:       generateSemiGenericRegex([]string{"flickr"}, alphaNumeric("32"), true),
 
 		Keywords: []string{

+ 3 - 3
cmd/generate/config/rules/flutterwave.go

@@ -10,7 +10,7 @@ import (
 func FlutterwavePublicKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Finicity Public Key",
+		Description: "Detected a Finicity Public Key, potentially exposing public cryptographic operations and integrations.",
 		RuleID:      "flutterwave-public-key",
 		Regex:       regexp.MustCompile(`FLWPUBK_TEST-(?i)[a-h0-9]{32}-X`),
 		Keywords:    []string{"FLWPUBK_TEST"},
@@ -26,7 +26,7 @@ func FlutterwavePublicKey() *config.Rule {
 func FlutterwaveSecretKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Flutterwave Secret Key",
+		Description: "Identified a Flutterwave Secret Key, risking unauthorized financial transactions and data breaches.",
 		RuleID:      "flutterwave-secret-key",
 		Regex:       regexp.MustCompile(`FLWSECK_TEST-(?i)[a-h0-9]{32}-X`),
 		Keywords:    []string{"FLWSECK_TEST"},
@@ -42,7 +42,7 @@ func FlutterwaveSecretKey() *config.Rule {
 func FlutterwaveEncKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Flutterwave Encryption Key",
+		Description: "Uncovered a Flutterwave Encryption Key, which may compromise payment processing and sensitive financial information.",
 		RuleID:      "flutterwave-encryption-key",
 		Regex:       regexp.MustCompile(`FLWSECK_TEST-(?i)[a-h0-9]{12}`),
 		Keywords:    []string{"FLWSECK_TEST"},

+ 1 - 1
cmd/generate/config/rules/frameio.go

@@ -10,7 +10,7 @@ import (
 func FrameIO() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Frame.io API token",
+		Description: "Found a Frame.io API token, potentially compromising video collaboration and project management.",
 		RuleID:      "frameio-api-token",
 		Regex:       regexp.MustCompile(`fio-u-(?i)[a-z0-9\-_=]{64}`),
 		Keywords:    []string{"fio-u-"},

+ 1 - 1
cmd/generate/config/rules/freshbooks.go

@@ -9,7 +9,7 @@ func FreshbooksAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "freshbooks-access-token",
-		Description: "Freshbooks Access Token",
+		Description: "Discovered a Freshbooks Access Token, posing a risk to accounting software access and sensitive financial data exposure.",
 		Regex:       generateSemiGenericRegex([]string{"freshbooks"}, alphaNumeric("64"), true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/gcp.go

@@ -28,7 +28,7 @@ func GCPAPIKey() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "gcp-api-key",
-		Description: "GCP API key",
+		Description: "Uncovered a GCP API key, which could lead to unauthorized access to Google Cloud services and data breaches.",
 		Regex:       generateUniqueTokenRegex(`AIza[0-9A-Za-z\\-_]{35}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/generic.go

@@ -8,7 +8,7 @@ func GenericCredential() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "generic-api-key",
-		Description: "Generic API Key",
+		Description: "Detected a Generic API Key, potentially exposing access to various services and sensitive operations.",
 		Regex: generateSemiGenericRegex([]string{
 			"key",
 			"api",

+ 5 - 5
cmd/generate/config/rules/github.go

@@ -10,7 +10,7 @@ import (
 func GitHubPat() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "GitHub Personal Access Token",
+		Description: "Uncovered a GitHub Personal Access Token, potentially leading to unauthorized repository access and sensitive content exposure.",
 		RuleID:      "github-pat",
 		Regex:       regexp.MustCompile(`ghp_[0-9a-zA-Z]{36}`),
 		Keywords:    []string{"ghp_"},
@@ -26,7 +26,7 @@ func GitHubPat() *config.Rule {
 func GitHubFineGrainedPat() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "GitHub Fine-Grained Personal Access Token",
+		Description: "Found a GitHub Fine-Grained Personal Access Token, risking unauthorized repository access and code manipulation.",
 		RuleID:      "github-fine-grained-pat",
 		Regex:       regexp.MustCompile(`github_pat_[0-9a-zA-Z_]{82}`),
 		Keywords:    []string{"github_pat_"},
@@ -42,7 +42,7 @@ func GitHubFineGrainedPat() *config.Rule {
 func GitHubOauth() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "GitHub OAuth Access Token",
+		Description: "Discovered a GitHub OAuth Access Token, posing a risk of compromised GitHub account integrations and data leaks.",
 		RuleID:      "github-oauth",
 		Regex:       regexp.MustCompile(`gho_[0-9a-zA-Z]{36}`),
 		Keywords:    []string{"gho_"},
@@ -58,7 +58,7 @@ func GitHubOauth() *config.Rule {
 func GitHubApp() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "GitHub App Token",
+		Description: "Identified a GitHub App Token, which may compromise GitHub application integrations and source code security.",
 		RuleID:      "github-app-token",
 		Regex:       regexp.MustCompile(`(ghu|ghs)_[0-9a-zA-Z]{36}`),
 		Keywords:    []string{"ghu_", "ghs_"},
@@ -75,7 +75,7 @@ func GitHubApp() *config.Rule {
 func GitHubRefresh() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "GitHub Refresh Token",
+		Description: "Detected a GitHub Refresh Token, which could allow prolonged unauthorized access to GitHub services.",
 		RuleID:      "github-refresh-token",
 		Regex:       regexp.MustCompile(`ghr_[0-9a-zA-Z]{36}`),
 		Keywords:    []string{"ghr_"},

+ 3 - 3
cmd/generate/config/rules/gitlab.go

@@ -10,7 +10,7 @@ import (
 func GitlabPat() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "GitLab Personal Access Token",
+		Description: "Identified a GitLab Personal Access Token, risking unauthorized access to GitLab repositories and codebase exposure.",
 		RuleID:      "gitlab-pat",
 		Regex:       regexp.MustCompile(`glpat-[0-9a-zA-Z\-\_]{20}`),
 		Keywords:    []string{"glpat-"},
@@ -26,7 +26,7 @@ func GitlabPat() *config.Rule {
 func GitlabPipelineTriggerToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "GitLab Pipeline Trigger Token",
+		Description: "Found a GitLab Pipeline Trigger Token, potentially compromising continuous integration workflows and project security.",
 		RuleID:      "gitlab-ptt",
 		Regex:       regexp.MustCompile(`glptt-[0-9a-f]{40}`),
 		Keywords:    []string{"glptt-"},
@@ -42,7 +42,7 @@ func GitlabPipelineTriggerToken() *config.Rule {
 func GitlabRunnerRegistrationToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "GitLab Runner Registration Token",
+		Description: "Discovered a GitLab Runner Registration Token, posing a risk to CI/CD pipeline integrity and unauthorized access.",
 		RuleID:      "gitlab-rrt",
 		Regex:       regexp.MustCompile(`GR1348941[0-9a-zA-Z\-\_]{20}`),
 		Keywords:    []string{"GR1348941"},

+ 1 - 1
cmd/generate/config/rules/gitter.go

@@ -9,7 +9,7 @@ func GitterAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "gitter-access-token",
-		Description: "Gitter Access Token",
+		Description: "Uncovered a Gitter Access Token, which may lead to unauthorized access to chat and communication services.",
 		Regex: generateSemiGenericRegex([]string{"gitter"},
 			alphaNumericExtendedShort("40"), true),
 

+ 1 - 1
cmd/generate/config/rules/gocardless.go

@@ -9,7 +9,7 @@ func GoCardless() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "gocardless-api-token",
-		Description: "GoCardless API token",
+		Description: "Detected a GoCardless API token, potentially risking unauthorized direct debit payment operations and financial data exposure.",
 		Regex:       generateSemiGenericRegex([]string{"gocardless"}, `live_(?i)[a-z0-9\-_=]{40}`, true),
 
 		Keywords: []string{

+ 3 - 3
cmd/generate/config/rules/grafana.go

@@ -8,7 +8,7 @@ import (
 func GrafanaApiKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Grafana api key (or Grafana cloud api key)",
+		Description: "Identified a Grafana API key, which could compromise monitoring dashboards and sensitive data analytics.",
 		RuleID:      "grafana-api-key",
 
 		Regex:    generateUniqueTokenRegex(`eyJrIjoi[A-Za-z0-9]{70,400}={0,2}`, true),
@@ -27,7 +27,7 @@ func GrafanaApiKey() *config.Rule {
 func GrafanaCloudApiToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Grafana cloud api token",
+		Description: "Found a Grafana cloud API token, risking unauthorized access to cloud-based monitoring services and data exposure.",
 		RuleID:      "grafana-cloud-api-token",
 
 		Regex:    generateUniqueTokenRegex(`glc_[A-Za-z0-9+/]{32,400}={0,2}`, true),
@@ -46,7 +46,7 @@ func GrafanaCloudApiToken() *config.Rule {
 func GrafanaServiceAccountToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Grafana service account token",
+		Description: "Discovered a Grafana service account token, posing a risk of compromised monitoring services and data integrity.",
 		RuleID:      "grafana-service-account-token",
 
 		Regex:    generateUniqueTokenRegex(`glsa_[A-Za-z0-9]{32}_[A-Fa-f0-9]{8}`, true),

+ 2 - 2
cmd/generate/config/rules/hashicorp.go

@@ -11,7 +11,7 @@ import (
 func Hashicorp() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "HashiCorp Terraform user/org API token",
+		Description: "Uncovered a HashiCorp Terraform user/org API token, which may lead to unauthorized infrastructure management and security breaches.",
 		RuleID:      "hashicorp-tf-api-token",
 		Regex:       regexp.MustCompile(`(?i)[a-z0-9]{14}\.atlasv1\.[a-z0-9\-_=]{60,70}`),
 		Keywords:    []string{"atlasv1"},
@@ -28,7 +28,7 @@ func HashicorpField() *config.Rule {
 	keywords := []string{"administrator_login_password", "password"}
 	// define rule
 	r := config.Rule{
-		Description: "HashiCorp Terraform password field",
+		Description: "Identified a HashiCorp Terraform password field, risking unauthorized infrastructure configuration and security breaches.",
 		RuleID:      "hashicorp-tf-password",
 		Regex:       generateSemiGenericRegex(keywords, fmt.Sprintf(`"%s"`, alphaNumericExtended("8,20")), true),
 		Keywords:    keywords,

+ 1 - 1
cmd/generate/config/rules/heroku.go

@@ -7,7 +7,7 @@ import (
 func Heroku() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Heroku API Key",
+		Description: "Detected a Heroku API Key, potentially compromising cloud application deployments and operational security.",
 		RuleID:      "heroku-api-key",
 		Regex:       generateSemiGenericRegex([]string{"heroku"}, hex8_4_4_4_12(), true),
 

+ 1 - 1
cmd/generate/config/rules/hubspot.go

@@ -7,7 +7,7 @@ import (
 func HubSpot() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "HubSpot API Token",
+		Description: "Found a HubSpot API Token, posing a risk to CRM data integrity and unauthorized marketing operations.",
 		RuleID:      "hubspot-api-key",
 		Regex: generateSemiGenericRegex([]string{"hubspot"},
 			`[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}`, true),

+ 2 - 2
cmd/generate/config/rules/huggingface.go

@@ -16,7 +16,7 @@ func HuggingFaceAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "huggingface-access-token",
-		Description: "Hugging Face Access token",
+		Description: "Discovered a Hugging Face Access token, which could lead to unauthorized access to AI models and sensitive data.",
 		Regex:       regexp.MustCompile(`(?:^|[\\'"` + "`" + ` >=:])(hf_[a-zA-Z]{34})(?:$|[\\'"` + "`" + ` <])`),
 
 		Entropy: 1,
@@ -71,7 +71,7 @@ func HuggingFaceOrganizationApiToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "huggingface-organization-api-token",
-		Description: "Hugging Face Organization API token",
+		Description: "Uncovered a Hugging Face Organization API token, potentially compromising AI organization accounts and associated data.",
 		Regex:       regexp.MustCompile(`(?:^|[\\'"` + "`" + ` >=:\(,)])(api_org_[a-zA-Z]{34})(?:$|[\\'"` + "`" + ` <\),])`),
 
 		Entropy: 2,

+ 1 - 1
cmd/generate/config/rules/infracost.go

@@ -9,7 +9,7 @@ func InfracostAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		// Human readable description of the rule
-		Description: "Infracost API Token",
+		Description: "Detected an Infracost API Token, risking unauthorized access to cloud cost estimation tools and financial data.",
 
 		// Unique ID for the rule
 		RuleID: "infracost-api-token",

+ 1 - 1
cmd/generate/config/rules/intercom.go

@@ -8,7 +8,7 @@ import (
 func Intercom() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Intercom API Token",
+		Description: "Identified an Intercom API Token, which could compromise customer communication channels and data privacy.",
 		RuleID:      "intercom-api-key",
 		Regex:       generateSemiGenericRegex([]string{"intercom"}, alphaNumericExtended("60"), true),
 

+ 2 - 2
cmd/generate/config/rules/jfrog.go

@@ -13,7 +13,7 @@ func JFrogAPIKey() *config.Rule {
 	// Define Rule
 	r := config.Rule{
 		// Human readable description of the rule
-		Description: "JFrog API Key",
+		Description: "Found a JFrog API Key, posing a risk of unauthorized access to software artifact repositories and build pipelines.",
 
 		// Unique ID for the rule
 		RuleID: "jfrog-api-key",
@@ -39,7 +39,7 @@ func JFrogIdentityToken() *config.Rule {
 	// Define Rule
 	r := config.Rule{
 		// Human readable description of the rule
-		Description: "JFrog Identity Token",
+		Description: "Discovered a JFrog Identity Token, potentially compromising access to JFrog services and sensitive software artifacts.",
 
 		// Unique ID for the rule
 		RuleID: "jfrog-identity-token",

+ 2 - 2
cmd/generate/config/rules/jwt.go

@@ -11,7 +11,7 @@ import (
 func JWT() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "JSON Web Token",
+		Description: "Uncovered a JSON Web Token, which may lead to unauthorized access to web applications and sensitive user data.",
 		RuleID:      "jwt",
 		Regex:       generateUniqueTokenRegex(`ey[a-zA-Z0-9]{17,}\.ey[a-zA-Z0-9\/\\_-]{17,}\.(?:[a-zA-Z0-9\/\\_-]{10,}={0,2})?`, false),
 		Keywords:    []string{"ey"},
@@ -68,7 +68,7 @@ func JWTBase64() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "jwt-base64",
-		Description: "Base64-encoded JSON Web Token",
+		Description: "Detected a Base64-encoded JSON Web Token, posing a risk of exposing encoded authentication and data exchange information.",
 		Regex: regexp.MustCompile(
 			`\bZXlK(?:(?P<alg>aGJHY2lPaU)|(?P<apu>aGNIVWlPaU)|(?P<apv>aGNIWWlPaU)|(?P<aud>aGRXUWlPaU)|(?P<b64>aU5qUWlP)|(?P<crit>amNtbDBJanBi)|(?P<cty>amRIa2lPaU)|(?P<epk>bGNHc2lPbn)|(?P<enc>bGJtTWlPaU)|(?P<jku>cWEzVWlPaU)|(?P<jwk>cWQyc2lPb)|(?P<iss>cGMzTWlPaU)|(?P<iv>cGRpSTZJ)|(?P<kid>cmFXUWlP)|(?P<key_ops>clpYbGZiM0J6SWpwY)|(?P<kty>cmRIa2lPaUp)|(?P<nonce>dWIyNWpaU0k2)|(?P<p2c>d01tTWlP)|(?P<p2s>d01uTWlPaU)|(?P<ppt>d2NIUWlPaU)|(?P<sub>emRXSWlPaU)|(?P<svt>emRuUWlP)|(?P<tag>MFlXY2lPaU)|(?P<typ>MGVYQWlPaUp)|(?P<url>MWNtd2l)|(?P<use>MWMyVWlPaUp)|(?P<ver>MlpYSWlPaU)|(?P<version>MlpYSnphVzl1SWpv)|(?P<x>NElqb2)|(?P<x5c>NE5XTWlP)|(?P<x5t>NE5YUWlPaU)|(?P<x5ts256>NE5YUWpVekkxTmlJNkl)|(?P<x5u>NE5YVWlPaU)|(?P<zip>NmFYQWlPaU))[a-zA-Z0-9\/\\_+\-\r\n]{40,}={0,2}`),
 		Keywords: []string{"zxlk"},

+ 1 - 1
cmd/generate/config/rules/kraken.go

@@ -9,7 +9,7 @@ func KrakenAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "kraken-access-token",
-		Description: "Kraken Access Token",
+		Description: "Identified a Kraken Access Token, potentially compromising cryptocurrency trading accounts and financial security.",
 		Regex: generateSemiGenericRegex([]string{"kraken"},
 			alphaNumericExtendedLong("80,90"), true),
 

+ 2 - 2
cmd/generate/config/rules/kucoin.go

@@ -9,7 +9,7 @@ func KucoinAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "kucoin-access-token",
-		Description: "Kucoin Access Token",
+		Description: "Found a Kucoin Access Token, risking unauthorized access to cryptocurrency exchange services and transactions.",
 		Regex:       generateSemiGenericRegex([]string{"kucoin"}, hex("24"), true),
 
 		Keywords: []string{
@@ -28,7 +28,7 @@ func KucoinSecretKey() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "kucoin-secret-key",
-		Description: "Kucoin Secret Key",
+		Description: "Discovered a Kucoin Secret Key, which could lead to compromised cryptocurrency operations and financial data breaches.",
 		Regex:       generateSemiGenericRegex([]string{"kucoin"}, hex8_4_4_4_12(), true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/launchdarkly.go

@@ -9,7 +9,7 @@ func LaunchDarklyAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "launchdarkly-access-token",
-		Description: "Launchdarkly Access Token",
+		Description: "Uncovered a Launchdarkly Access Token, potentially compromising feature flag management and application functionality.",
 		Regex:       generateSemiGenericRegex([]string{"launchdarkly"}, alphaNumericExtended("40"), true),
 
 		Keywords: []string{

+ 2 - 2
cmd/generate/config/rules/linear.go

@@ -10,7 +10,7 @@ import (
 func LinearAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Linear API Token",
+		Description: "Detected a Linear API Token, posing a risk to project management tools and sensitive task data.",
 		RuleID:      "linear-api-key",
 		Regex:       regexp.MustCompile(`lin_api_(?i)[a-z0-9]{40}`),
 		Keywords:    []string{"lin_api_"},
@@ -26,7 +26,7 @@ func LinearAPIToken() *config.Rule {
 func LinearClientSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Linear Client Secret",
+		Description: "Identified a Linear Client Secret, which may compromise secure integrations and sensitive project management data.",
 		RuleID:      "linear-client-secret",
 		Regex:       generateSemiGenericRegex([]string{"linear"}, hex("32"), true),
 		Keywords:    []string{"linear"},

+ 2 - 2
cmd/generate/config/rules/linkedin.go

@@ -9,7 +9,7 @@ func LinkedinClientSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "linkedin-client-secret",
-		Description: "LinkedIn Client secret",
+		Description: "Discovered a LinkedIn Client secret, potentially compromising LinkedIn application integrations and user data.",
 		Regex: generateSemiGenericRegex([]string{
 			"linkedin",
 			"linked-in",
@@ -32,7 +32,7 @@ func LinkedinClientID() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "linkedin-client-id",
-		Description: "LinkedIn Client ID",
+		Description: "Found a LinkedIn Client ID, risking unauthorized access to LinkedIn integrations and professional data exposure.",
 		Regex: generateSemiGenericRegex([]string{
 			"linkedin",
 			"linked-in",

+ 2 - 2
cmd/generate/config/rules/lob.go

@@ -8,7 +8,7 @@ import (
 func LobPubAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Lob Publishable API Key",
+		Description: "Detected a Lob Publishable API Key, posing a risk of exposing mail and print service integrations.",
 		RuleID:      "lob-pub-api-key",
 		Regex:       generateSemiGenericRegex([]string{"lob"}, `(test|live)_pub_[a-f0-9]{31}`, true),
 
@@ -29,7 +29,7 @@ func LobPubAPIToken() *config.Rule {
 func LobAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Lob API Key",
+		Description: "Uncovered a Lob API Key, which could lead to unauthorized access to mailing and address verification services.",
 		RuleID:      "lob-api-key",
 		Regex:       generateSemiGenericRegex([]string{"lob"}, `(live|test)_[a-f0-9]{35}`, true),
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/mailchimp.go

@@ -9,7 +9,7 @@ func MailChimp() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "mailchimp-api-key",
-		Description: "Mailchimp API key",
+		Description: "Identified a Mailchimp API key, potentially compromising email marketing campaigns and subscriber data.",
 		Regex:       generateSemiGenericRegex([]string{"mailchimp"}, `[a-f0-9]{32}-us20`, true),
 
 		Keywords: []string{

+ 3 - 3
cmd/generate/config/rules/mailgun.go

@@ -9,7 +9,7 @@ func MailGunPrivateAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "mailgun-private-api-token",
-		Description: "Mailgun private API token",
+		Description: "Found a Mailgun private API token, risking unauthorized email service operations and data breaches.",
 		Regex:       generateSemiGenericRegex([]string{"mailgun"}, `key-[a-f0-9]{32}`, true),
 
 		Keywords: []string{
@@ -28,7 +28,7 @@ func MailGunPubAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "mailgun-pub-key",
-		Description: "Mailgun public validation key",
+		Description: "Discovered a Mailgun public validation key, which could expose email verification processes and associated data.",
 		Regex:       generateSemiGenericRegex([]string{"mailgun"}, `pubkey-[a-f0-9]{32}`, true),
 
 		Keywords: []string{
@@ -47,7 +47,7 @@ func MailGunSigningKey() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "mailgun-signing-key",
-		Description: "Mailgun webhook signing key",
+		Description: "Uncovered a Mailgun webhook signing key, potentially compromising email automation and data integrity.",
 		Regex:       generateSemiGenericRegex([]string{"mailgun"}, `[a-h0-9]{32}-[a-h0-9]{8}-[a-h0-9]{8}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/mapbox.go

@@ -8,7 +8,7 @@ import (
 func MapBox() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "MapBox API token",
+		Description: "Detected a MapBox API token, posing a risk to geospatial services and sensitive location data exposure.",
 		RuleID:      "mapbox-api-token",
 		Regex:       generateSemiGenericRegex([]string{"mapbox"}, `pk\.[a-z0-9]{60}\.[a-z0-9]{22}`, true),
 

+ 1 - 1
cmd/generate/config/rules/mattermost.go

@@ -9,7 +9,7 @@ func MattermostAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "mattermost-access-token",
-		Description: "Mattermost Access Token",
+		Description: "Identified a Mattermost Access Token, which may compromise team communication channels and data privacy.",
 		Regex:       generateSemiGenericRegex([]string{"mattermost"}, alphaNumeric("26"), true),
 
 		Keywords: []string{

+ 2 - 2
cmd/generate/config/rules/messagebird.go

@@ -8,7 +8,7 @@ import (
 func MessageBirdAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "MessageBird API token",
+		Description: "Found a MessageBird API token, risking unauthorized access to communication platforms and message data.",
 		RuleID:      "messagebird-api-token",
 		Regex: generateSemiGenericRegex([]string{
 			"messagebird",
@@ -35,7 +35,7 @@ func MessageBirdAPIToken() *config.Rule {
 func MessageBirdClientID() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "MessageBird client ID",
+		Description: "Discovered a MessageBird client ID, potentially compromising API integrations and sensitive communication data.",
 		RuleID:      "messagebird-client-id",
 		Regex: generateSemiGenericRegex([]string{
 			"messagebird",

+ 1 - 1
cmd/generate/config/rules/netlify.go

@@ -9,7 +9,7 @@ func NetlifyAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "netlify-access-token",
-		Description: "Netlify Access Token",
+		Description: "Detected a Netlify Access Token, potentially compromising web hosting services and site management.",
 		Regex: generateSemiGenericRegex([]string{"netlify"},
 			alphaNumericExtended("40,46"), true),
 

+ 3 - 3
cmd/generate/config/rules/newrelic.go

@@ -9,7 +9,7 @@ func NewRelicUserID() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "new-relic-user-api-key",
-		Description: "New Relic user API Key",
+		Description: "Discovered a New Relic user API Key, which could lead to compromised application insights and performance monitoring.",
 		Regex: generateSemiGenericRegex([]string{
 			"new-relic",
 			"newrelic",
@@ -32,7 +32,7 @@ func NewRelicUserKey() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "new-relic-user-api-id",
-		Description: "New Relic user API ID",
+		Description: "Found a New Relic user API ID, posing a risk to application monitoring services and data integrity.",
 		Regex: generateSemiGenericRegex([]string{
 			"new-relic",
 			"newrelic",
@@ -57,7 +57,7 @@ func NewRelicBrowserAPIKey() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "new-relic-browser-api-token",
-		Description: "New Relic ingest browser API token",
+		Description: "Identified a New Relic ingest browser API token, risking unauthorized access to application performance data and analytics.",
 		Regex: generateSemiGenericRegex([]string{
 			"new-relic",
 			"newrelic",

+ 1 - 1
cmd/generate/config/rules/npm.go

@@ -9,7 +9,7 @@ func NPM() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "npm-access-token",
-		Description: "npm access token",
+		Description: "Uncovered an npm access token, potentially compromising package management and code repository access.",
 		Regex:       generateUniqueTokenRegex(`npm_[a-z0-9]{36}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/nytimes.go

@@ -9,7 +9,7 @@ func NytimesAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "nytimes-access-token",
-		Description: "Nytimes Access Token",
+		Description: "Detected a Nytimes Access Token, risking unauthorized access to New York Times APIs and content services.",
 		Regex: generateSemiGenericRegex([]string{
 			"nytimes", "new-york-times,", "newyorktimes"},
 			alphaNumericExtended("32"), true),

+ 1 - 1
cmd/generate/config/rules/okta.go

@@ -9,7 +9,7 @@ func OktaAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "okta-access-token",
-		Description: "Okta Access Token",
+		Description: "Identified an Okta Access Token, which may compromise identity management services and user authentication data.",
 		Regex: generateSemiGenericRegex([]string{"okta"},
 			alphaNumericExtended("42"), true),
 

+ 1 - 1
cmd/generate/config/rules/openai.go

@@ -9,7 +9,7 @@ func OpenAI() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "openai-api-key",
-		Description: "OpenAI API Key",
+		Description: "Found an OpenAI API Key, posing a risk of unauthorized access to AI services and data manipulation.",
 		Regex:       generateUniqueTokenRegex(`sk-[a-zA-Z0-9]{20}T3BlbkFJ[a-zA-Z0-9]{20}`, true),
 
 		Keywords: []string{

+ 3 - 3
cmd/generate/config/rules/plaid.go

@@ -11,7 +11,7 @@ func PlaidAccessID() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "plaid-client-id",
-		Description: "Plaid Client ID",
+		Description: "Uncovered a Plaid Client ID, which could lead to unauthorized financial service integrations and data breaches.",
 		Regex:       generateSemiGenericRegex([]string{"plaid"}, alphaNumeric("24"), true),
 
 		Entropy: 3.5,
@@ -31,7 +31,7 @@ func PlaidSecretKey() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "plaid-secret-key",
-		Description: "Plaid Secret key",
+		Description: "Detected a Plaid Secret key, risking unauthorized access to financial accounts and sensitive transaction data.",
 		Regex:       generateSemiGenericRegex([]string{"plaid"}, alphaNumeric("30"), true),
 
 		Entropy: 3.5,
@@ -51,7 +51,7 @@ func PlaidAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "plaid-api-token",
-		Description: "Plaid API Token",
+		Description: "Discovered a Plaid API Token, potentially compromising financial data aggregation and banking services.",
 		Regex: generateSemiGenericRegex([]string{"plaid"},
 			fmt.Sprintf("access-(?:sandbox|development|production)-%s", hex8_4_4_4_12()), true),
 

+ 3 - 3
cmd/generate/config/rules/planetscale.go

@@ -9,7 +9,7 @@ func PlanetScalePassword() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "planetscale-password",
-		Description: "PlanetScale password",
+		Description: "Discovered a PlanetScale password, which could lead to unauthorized database operations and data breaches.",
 		Regex:       generateUniqueTokenRegex(`pscale_pw_(?i)[a-z0-9=\-_\.]{32,64}`, true),
 
 		Keywords: []string{
@@ -30,7 +30,7 @@ func PlanetScaleAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "planetscale-api-token",
-		Description: "PlanetScale API token",
+		Description: "Identified a PlanetScale API token, potentially compromising database management and operations.",
 		Regex:       generateUniqueTokenRegex(`pscale_tkn_(?i)[a-z0-9=\-_\.]{32,64}`, true),
 
 		Keywords: []string{
@@ -51,7 +51,7 @@ func PlanetScaleOAuthToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "planetscale-oauth-token",
-		Description: "PlanetScale OAuth token",
+		Description: "Found a PlanetScale OAuth token, posing a risk to database access control and sensitive data integrity.",
 		Regex:       generateUniqueTokenRegex(`pscale_oauth_(?i)[a-z0-9=\-_\.]{32,64}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/postman.go

@@ -9,7 +9,7 @@ func PostManAPI() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "postman-api-token",
-		Description: "Postman API token",
+		Description: "Uncovered a Postman API token, potentially compromising API testing and development workflows.",
 		Regex:       generateUniqueTokenRegex(`PMAK-(?i)[a-f0-9]{24}\-[a-f0-9]{34}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/prefect.go

@@ -9,7 +9,7 @@ func Prefect() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "prefect-api-token",
-		Description: "Prefect API token",
+		Description: "Detected a Prefect API token, risking unauthorized access to workflow management and automation services.",
 		Regex:       generateUniqueTokenRegex(`pnu_[a-z0-9]{36}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/privatekey.go

@@ -9,7 +9,7 @@ import (
 func PrivateKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Private Key",
+		Description: "Identified a Private Key, which may compromise cryptographic security and sensitive data encryption.",
 		RuleID:      "private-key",
 		Regex:       regexp.MustCompile(`(?i)-----BEGIN[ A-Z0-9_-]{0,100}PRIVATE KEY( BLOCK)?-----[\s\S-]*KEY( BLOCK)?----`),
 		Keywords:    []string{"-----BEGIN"},

+ 1 - 1
cmd/generate/config/rules/pulumi.go

@@ -9,7 +9,7 @@ func PulumiAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "pulumi-api-token",
-		Description: "Pulumi API token",
+		Description: "Found a Pulumi API token, posing a risk to infrastructure as code services and cloud resource management.",
 		Regex:       generateUniqueTokenRegex(`pul-[a-f0-9]{40}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/pypi.go

@@ -10,7 +10,7 @@ import (
 func PyPiUploadToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "PyPI upload token",
+		Description: "Discovered a PyPI upload token, potentially compromising Python package distribution and repository integrity.",
 		RuleID:      "pypi-upload-token",
 		Regex: regexp.MustCompile(
 			`pypi-AgEIcHlwaS5vcmc[A-Za-z0-9\-_]{50,1000}`),

+ 1 - 1
cmd/generate/config/rules/rapidapi.go

@@ -9,7 +9,7 @@ func RapidAPIAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "rapidapi-access-token",
-		Description: "RapidAPI Access Token",
+		Description: "Uncovered a RapidAPI Access Token, which could lead to unauthorized access to various APIs and data services.",
 		Regex: generateSemiGenericRegex([]string{"rapidapi"},
 			alphaNumericExtendedShort("50"), true),
 

+ 1 - 1
cmd/generate/config/rules/readme.go

@@ -9,7 +9,7 @@ func ReadMe() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "readme-api-token",
-		Description: "Readme API token",
+		Description: "Detected a Readme API token, risking unauthorized documentation management and content exposure.",
 		Regex:       generateUniqueTokenRegex(`rdme_[a-z0-9]{70}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/rubygems.go

@@ -9,7 +9,7 @@ func RubyGemsAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "rubygems-api-token",
-		Description: "Rubygem API token",
+		Description: "Identified a Rubygem API token, potentially compromising Ruby library distribution and package management.",
 		Regex:       generateUniqueTokenRegex(`rubygems_[a-f0-9]{48}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/scalingo.go

@@ -10,7 +10,7 @@ import (
 func ScalingoAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Scalingo API token",
+		Description: "Found a Scalingo API token, posing a risk to cloud platform services and application deployment security.",
 		RuleID:      "scalingo-api-token",
 		Regex:       regexp.MustCompile(`\btk-us-[a-zA-Z0-9-_]{48}\b`),
 		Keywords:    []string{"tk-us-"},

+ 2 - 2
cmd/generate/config/rules/sendbird.go

@@ -9,7 +9,7 @@ func SendbirdAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "sendbird-access-token",
-		Description: "Sendbird Access Token",
+		Description: "Uncovered a Sendbird Access Token, potentially risking unauthorized access to communication services and user data.",
 		Regex:       generateSemiGenericRegex([]string{"sendbird"}, hex("40"), true),
 
 		Keywords: []string{
@@ -28,7 +28,7 @@ func SendbirdAccessID() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "sendbird-access-id",
-		Description: "Sendbird Access ID",
+		Description: "Discovered a Sendbird Access ID, which could compromise chat and messaging platform integrations.",
 		Regex:       generateSemiGenericRegex([]string{"sendbird"}, hex8_4_4_4_12(), true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/sendgrid.go

@@ -9,7 +9,7 @@ func SendGridAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "sendgrid-api-token",
-		Description: "SendGrid API token",
+		Description: "Detected a SendGrid API token, posing a risk of unauthorized email service operations and data exposure.",
 		Regex:       generateUniqueTokenRegex(`SG\.(?i)[a-z0-9=_\-\.]{66}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/sendinblue.go

@@ -9,7 +9,7 @@ func SendInBlueAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "sendinblue-api-token",
-		Description: "Sendinblue API token",
+		Description: "Identified a Sendinblue API token, which may compromise email marketing services and subscriber data privacy.",
 		Regex:       generateUniqueTokenRegex(`xkeysib-[a-f0-9]{64}\-(?i)[a-z0-9]{16}`, true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/sentry.go

@@ -9,7 +9,7 @@ func SentryAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "sentry-access-token",
-		Description: "Sentry Access Token",
+		Description: "Found a Sentry Access Token, risking unauthorized access to error tracking services and sensitive application data.",
 		Regex:       generateSemiGenericRegex([]string{"sentry"}, hex("64"), true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/shippo.go

@@ -9,7 +9,7 @@ func ShippoAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "shippo-api-token",
-		Description: "Shippo API token",
+		Description: "Discovered a Shippo API token, potentially compromising shipping services and customer order data.",
 		Regex:       generateUniqueTokenRegex(`shippo_(live|test)_[a-f0-9]{40}`, true),
 
 		Keywords: []string{

+ 4 - 4
cmd/generate/config/rules/shopify.go

@@ -10,7 +10,7 @@ import (
 func ShopifySharedSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Shopify shared secret",
+		Description: "Found a Shopify shared secret, posing a risk to application authentication and e-commerce platform security.",
 		RuleID:      "shopify-shared-secret",
 		Regex:       regexp.MustCompile(`shpss_[a-fA-F0-9]{32}`),
 		Keywords:    []string{"shpss_"},
@@ -24,7 +24,7 @@ func ShopifySharedSecret() *config.Rule {
 func ShopifyAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Shopify access token",
+		Description: "Uncovered a Shopify access token, which could lead to unauthorized e-commerce platform access and data breaches.",
 		RuleID:      "shopify-access-token",
 		Regex:       regexp.MustCompile(`shpat_[a-fA-F0-9]{32}`),
 		Keywords:    []string{"shpat_"},
@@ -38,7 +38,7 @@ func ShopifyAccessToken() *config.Rule {
 func ShopifyCustomAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Shopify custom access token",
+		Description: "Detected a Shopify custom access token, potentially compromising custom app integrations and e-commerce data security.",
 		RuleID:      "shopify-custom-access-token",
 		Regex:       regexp.MustCompile(`shpca_[a-fA-F0-9]{32}`),
 		Keywords:    []string{"shpca_"},
@@ -52,7 +52,7 @@ func ShopifyCustomAccessToken() *config.Rule {
 func ShopifyPrivateAppAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Shopify private app access token",
+		Description: "Identified a Shopify private app access token, risking unauthorized access to private app data and store operations.",
 		RuleID:      "shopify-private-app-access-token",
 		Regex:       regexp.MustCompile(`shppa_[a-fA-F0-9]{32}`),
 		Keywords:    []string{"shppa_"},

+ 2 - 2
cmd/generate/config/rules/sidekiq.go

@@ -9,7 +9,7 @@ import (
 func SidekiqSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Sidekiq Secret",
+		Description: "Discovered a Sidekiq Secret, which could lead to compromised background job processing and application data breaches.",
 		RuleID:      "sidekiq-secret",
 
 		Regex: generateSemiGenericRegex([]string{"BUNDLE_ENTERPRISE__CONTRIBSYS__COM", "BUNDLE_GEMS__CONTRIBSYS__COM"},
@@ -34,7 +34,7 @@ func SidekiqSecret() *config.Rule {
 func SidekiqSensitiveUrl() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Sidekiq Sensitive URL",
+		Description: "Uncovered a Sidekiq Sensitive URL, potentially exposing internal job queues and sensitive operation details.",
 		RuleID:      "sidekiq-sensitive-url",
 		SecretGroup: 2,
 		Regex:       regexp.MustCompile(`(?i)\b(http(?:s??):\/\/)([a-f0-9]{8}:[a-f0-9]{8})@(?:gems.contribsys.com|enterprise.contribsys.com)(?:[\/|\#|\?|:]|$)`),

+ 9 - 9
cmd/generate/config/rules/slack.go

@@ -12,7 +12,7 @@ import (
 func SlackBotToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Slack Bot token",
+		Description: "Identified a Slack Bot token, which may compromise bot integrations and communication channel security.",
 		RuleID:      "slack-bot-token",
 		Regex: regexp.MustCompile(
 			`(xoxb-[0-9]{10,13}\-[0-9]{10,13}[a-zA-Z0-9-]*)`),
@@ -43,7 +43,7 @@ func SlackBotToken() *config.Rule {
 func SlackUserToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Slack User",
+		Description: "Found a Slack User token, posing a risk of unauthorized user impersonation and data access within Slack workspaces.",
 		RuleID:      "slack-user-token",
 		// The last segment seems to be consistently 32 characters. I've made it 28-34 just in case.
 		Regex:    regexp.MustCompile(`(xox[pe](?:-[0-9]{10,13}){3}-[a-zA-Z0-9-]{28,34})`),
@@ -81,7 +81,7 @@ func SlackUserToken() *config.Rule {
 func SlackAppLevelToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Slack App-level token",
+		Description: "Detected a Slack App-level token, risking unauthorized access to Slack applications and workspace data.",
 		RuleID:      "slack-app-token",
 		// This regex is based on a limited number of examples and may not be 100% accurate.
 		Regex:    regexp.MustCompile(`(?i)(xapp-\d-[A-Z0-9]+-\d+-[a-z0-9]+)`),
@@ -102,7 +102,7 @@ func SlackAppLevelToken() *config.Rule {
 func SlackConfigurationToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Slack Configuration access token",
+		Description: "Found a Slack Configuration access token, posing a risk to workspace configuration and sensitive data access.",
 		RuleID:      "slack-config-access-token",
 		Regex:       regexp.MustCompile(`(?i)(xoxe.xox[bp]-\d-[A-Z0-9]{163,166})`),
 		Keywords:    []string{"xoxe.xoxb-", "xoxe.xoxp-"},
@@ -127,7 +127,7 @@ func SlackConfigurationToken() *config.Rule {
 func SlackConfigurationRefreshToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Slack Configuration refresh token",
+		Description: "Discovered a Slack Configuration refresh token, potentially allowing prolonged unauthorized access to configuration settings.",
 		RuleID:      "slack-config-refresh-token",
 		Regex:       regexp.MustCompile(`(?i)(xoxe-\d-[A-Z0-9]{146})`),
 		Keywords:    []string{"xoxe-"},
@@ -145,7 +145,7 @@ func SlackConfigurationRefreshToken() *config.Rule {
 // Reference: https://api.slack.com/authentication/token-types#legacy_bot
 func SlackLegacyBotToken() *config.Rule {
 	r := config.Rule{
-		Description: "Slack Legacy bot token",
+		Description: "Uncovered a Slack Legacy bot token, which could lead to compromised legacy bot operations and data exposure.",
 		RuleID:      "slack-legacy-bot-token",
 		// This rule is based off the limited information I could find and may not be 100% accurate.
 		Regex: regexp.MustCompile(
@@ -188,7 +188,7 @@ func SlackLegacyBotToken() *config.Rule {
 // Reference: https://api.slack.com/authentication/token-types#workspace
 func SlackLegacyWorkspaceToken() *config.Rule {
 	r := config.Rule{
-		Description: "Slack Legacy Workspace token",
+		Description: "Identified a Slack Legacy Workspace token, potentially compromising access to workspace data and legacy features.",
 		RuleID:      "slack-legacy-workspace-token",
 		// This is by far the least confident pattern.
 		Regex: regexp.MustCompile(
@@ -223,7 +223,7 @@ func SlackLegacyWorkspaceToken() *config.Rule {
 func SlackLegacyToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Slack Legacy token",
+		Description: "Detected a Slack Legacy token, risking unauthorized access to older Slack integrations and user data.",
 		RuleID:      "slack-legacy-token",
 		Regex:       regexp.MustCompile(`(xox[os]-\d+-\d+-\d+-[a-fA-F\d]+)`),
 		Keywords:    []string{"xoxo", "xoxs"},
@@ -254,7 +254,7 @@ func SlackLegacyToken() *config.Rule {
 func SlackWebHookUrl() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Slack Webhook",
+		Description: "Discovered a Slack Webhook, which could lead to unauthorized message posting and data leakage in Slack channels.",
 		RuleID:      "slack-webhook-url",
 		// If this generates too many false-positives we should define an allowlist (e.g., "xxxx", "00000").
 		Regex: regexp.MustCompile(

+ 1 - 1
cmd/generate/config/rules/snyk.go

@@ -16,7 +16,7 @@ func Snyk() *config.Rule {
 
 	// define rule
 	r := config.Rule{
-		Description: "Snyk API token",
+		Description: "Uncovered a Snyk API token, potentially compromising software vulnerability scanning and code security.",
 		RuleID:      "snyk-api-token",
 
 		Regex:    generateSemiGenericRegex(keywords, hex8_4_4_4_12(), true),

+ 1 - 1
cmd/generate/config/rules/square.go

@@ -9,7 +9,7 @@ func SquareAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "square-access-token",
-		Description: "Square Access Token",
+		Description: "Detected a Square Access Token, risking unauthorized payment processing and financial transaction exposure.",
 		Regex:       generateUniqueTokenRegex(`sq0atp-[0-9A-Za-z\-_]{22}`, true),
 		Keywords:    []string{"sq0atp-"},
 	}

+ 1 - 1
cmd/generate/config/rules/squarespace.go

@@ -9,7 +9,7 @@ func SquareSpaceAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "squarespace-access-token",
-		Description: "Squarespace Access Token",
+		Description: "Identified a Squarespace Access Token, which may compromise website management and content control on Squarespace.",
 		Regex:       generateSemiGenericRegex([]string{"squarespace"}, hex8_4_4_4_12(), true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/stripe.go

@@ -8,7 +8,7 @@ import (
 func StripeAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Stripe Access Token",
+		Description: "Found a Stripe Access Token, posing a risk to payment processing services and sensitive financial data.",
 		RuleID:      "stripe-access-token",
 		Regex:       generateUniqueTokenRegex(`(sk|pk)_(test|live)_[0-9a-z]{10,32}`, true),
 		Keywords: []string{

+ 2 - 2
cmd/generate/config/rules/sumologic.go

@@ -11,7 +11,7 @@ func SumoLogicAccessID() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "sumologic-access-id",
-		Description: "SumoLogic Access ID",
+		Description: "Discovered a SumoLogic Access ID, potentially compromising log management services and data analytics integrity.",
 		// TODO: Make 'su' case-sensitive.
 		Regex: generateSemiGenericRegex([]string{"sumo"},
 			"su[a-zA-Z0-9]{12}", false),
@@ -54,7 +54,7 @@ func SumoLogicAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "sumologic-access-token",
-		Description: "SumoLogic Access Token",
+		Description: "Uncovered a SumoLogic Access Token, which could lead to unauthorized access to log data and analytics insights.",
 		Regex: generateSemiGenericRegex([]string{"sumo"},
 			alphaNumeric("64"), true),
 

+ 1 - 1
cmd/generate/config/rules/teams.go

@@ -10,7 +10,7 @@ import (
 func TeamsWebhook() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Microsoft Teams Webhook",
+		Description: "Uncovered a Microsoft Teams Webhook, which could lead to unauthorized access to team collaboration tools and data leaks.",
 		RuleID:      "microsoft-teams-webhook",
 		Regex: regexp.MustCompile(
 			`https:\/\/[a-z0-9]+\.webhook\.office\.com\/webhookb2\/[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}@[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}\/IncomingWebhook\/[a-z0-9]{32}\/[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}`),

+ 1 - 1
cmd/generate/config/rules/telegram.go

@@ -10,7 +10,7 @@ import (
 func TelegramBotToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Telegram Bot API Token",
+		Description: "Detected a Telegram Bot API Token, risking unauthorized bot operations and message interception on Telegram.",
 		RuleID:      "telegram-bot-api-token",
 
 		Regex: regexp.MustCompile(`(?i)(?:^|[^0-9])([0-9]{5,16}:A[a-zA-Z0-9_\-]{34})(?:$|[^a-zA-Z0-9_\-])`),

+ 1 - 1
cmd/generate/config/rules/travisci.go

@@ -9,7 +9,7 @@ func TravisCIAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "travisci-access-token",
-		Description: "Travis CI Access Token",
+		Description: "Identified a Travis CI Access Token, potentially compromising continuous integration services and codebase security.",
 		Regex:       generateSemiGenericRegex([]string{"travis"}, alphaNumeric("22"), true),
 
 		Keywords: []string{

+ 1 - 1
cmd/generate/config/rules/twilio.go

@@ -10,7 +10,7 @@ import (
 func Twilio() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Twilio API Key",
+		Description: "Found a Twilio API Key, posing a risk to communication services and sensitive customer interaction data.",
 		RuleID:      "twilio-api-key",
 		Regex:       regexp.MustCompile(`SK[0-9a-fA-F]{32}`),
 		Keywords:    []string{"twilio"},

+ 1 - 1
cmd/generate/config/rules/twitch.go

@@ -9,7 +9,7 @@ func TwitchAPIToken() *config.Rule {
 	// define rule
 	r := config.Rule{
 		RuleID:      "twitch-api-token",
-		Description: "Twitch API token",
+		Description: "Discovered a Twitch API token, which could compromise streaming services and account integrations.",
 		Regex:       generateSemiGenericRegex([]string{"twitch"}, alphaNumeric("30"), true),
 		Keywords: []string{
 			"twitch",

+ 5 - 5
cmd/generate/config/rules/twitter.go

@@ -8,7 +8,7 @@ import (
 func TwitterAPIKey() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Twitter API Key",
+		Description: "Identified a Twitter API Key, which may compromise Twitter application integrations and user data security.",
 		RuleID:      "twitter-api-key",
 		Regex:       generateSemiGenericRegex([]string{"twitter"}, alphaNumeric("25"), true),
 		Keywords:    []string{"twitter"},
@@ -24,7 +24,7 @@ func TwitterAPIKey() *config.Rule {
 func TwitterAPISecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Twitter API Secret",
+		Description: "Found a Twitter API Secret, risking the security of Twitter app integrations and sensitive data access.",
 		RuleID:      "twitter-api-secret",
 		Regex:       generateSemiGenericRegex([]string{"twitter"}, alphaNumeric("50"), true),
 		Keywords:    []string{"twitter"},
@@ -40,7 +40,7 @@ func TwitterAPISecret() *config.Rule {
 func TwitterBearerToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Twitter Bearer Token",
+		Description: "Discovered a Twitter Bearer Token, potentially compromising API access and data retrieval from Twitter.",
 		RuleID:      "twitter-bearer-token",
 		Regex:       generateSemiGenericRegex([]string{"twitter"}, "A{22}[a-zA-Z0-9%]{80,100}", true),
 
@@ -57,7 +57,7 @@ func TwitterBearerToken() *config.Rule {
 func TwitterAccessToken() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Twitter Access Token",
+		Description: "Detected a Twitter Access Token, posing a risk of unauthorized account operations and social media data exposure.",
 		RuleID:      "twitter-access-token",
 		Regex:       generateSemiGenericRegex([]string{"twitter"}, "[0-9]{15,25}-[a-zA-Z0-9]{20,40}", true),
 		Keywords:    []string{"twitter"},
@@ -73,7 +73,7 @@ func TwitterAccessToken() *config.Rule {
 func TwitterAccessSecret() *config.Rule {
 	// define rule
 	r := config.Rule{
-		Description: "Twitter Access Secret",
+		Description: "Uncovered a Twitter Access Secret, potentially risking unauthorized Twitter integrations and data breaches.",
 		RuleID:      "twitter-access-secret",
 		Regex:       generateSemiGenericRegex([]string{"twitter"}, alphaNumeric("45"), true),
 		Keywords:    []string{"twitter"},

Algúns arquivos non se mostraron porque demasiados arquivos cambiaron neste cambio