digitalocean.go 1.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. )
  7. func DigitalOceanPAT() *config.Rule {
  8. r := config.Rule{
  9. RuleID: "digitalocean-pat",
  10. Description: "Discovered a DigitalOcean Personal Access Token, posing a threat to cloud infrastructure security and data privacy.",
  11. Regex: utils.GenerateUniqueTokenRegex(`dop_v1_[a-f0-9]{64}`, false),
  12. Entropy: 3,
  13. Keywords: []string{"dop_v1_"},
  14. }
  15. tps := []string{
  16. utils.GenerateSampleSecret("do", "dop_v1_"+secrets.NewSecret(utils.Hex("64"))),
  17. }
  18. return utils.Validate(r, tps, nil)
  19. }
  20. func DigitalOceanOAuthToken() *config.Rule {
  21. r := config.Rule{
  22. RuleID: "digitalocean-access-token",
  23. Description: "Found a DigitalOcean OAuth Access Token, risking unauthorized cloud resource access and data compromise.",
  24. Entropy: 3,
  25. Regex: utils.GenerateUniqueTokenRegex(`doo_v1_[a-f0-9]{64}`, false),
  26. Keywords: []string{"doo_v1_"},
  27. }
  28. tps := []string{
  29. utils.GenerateSampleSecret("do", "doo_v1_"+secrets.NewSecret(utils.Hex("64"))),
  30. }
  31. return utils.Validate(r, tps, nil)
  32. }
  33. func DigitalOceanRefreshToken() *config.Rule {
  34. r := config.Rule{
  35. Description: "Uncovered a DigitalOcean OAuth Refresh Token, which could allow prolonged unauthorized access and resource manipulation.",
  36. RuleID: "digitalocean-refresh-token",
  37. Regex: utils.GenerateUniqueTokenRegex(`dor_v1_[a-f0-9]{64}`, true),
  38. Keywords: []string{"dor_v1_"},
  39. }
  40. tps := []string{
  41. utils.GenerateSampleSecret("do", "dor_v1_"+secrets.NewSecret(utils.Hex("64"))),
  42. }
  43. return utils.Validate(r, tps, nil)
  44. }