adobe.go 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. )
  7. func AdobeClientID() *config.Rule {
  8. // define rule
  9. r := config.Rule{
  10. RuleID: "adobe-client-id",
  11. Description: "Detected a pattern that resembles an Adobe OAuth Web Client ID, posing a risk of compromised Adobe integrations and data breaches.",
  12. Regex: utils.GenerateSemiGenericRegex([]string{"adobe"}, utils.Hex("32"), true),
  13. Entropy: 2,
  14. Keywords: []string{"adobe"},
  15. }
  16. // validate
  17. tps := []string{
  18. utils.GenerateSampleSecret("adobe", secrets.NewSecret(utils.Hex("32"))),
  19. }
  20. return utils.Validate(r, tps, nil)
  21. }
  22. func AdobeClientSecret() *config.Rule {
  23. // define rule
  24. r := config.Rule{
  25. RuleID: "adobe-client-secret",
  26. Description: "Discovered a potential Adobe Client Secret, which, if exposed, could allow unauthorized Adobe service access and data manipulation.",
  27. Regex: utils.GenerateUniqueTokenRegex(`p8e-(?i)[a-z0-9]{32}`, false),
  28. Entropy: 2,
  29. Keywords: []string{"p8e-"},
  30. }
  31. // validate
  32. tps := []string{
  33. "adobeClient := \"p8e-" + secrets.NewSecret(utils.Hex("32")) + "\"",
  34. }
  35. return utils.Validate(r, tps, nil)
  36. }