bitbucket.go 1.3 KB

12345678910111213141516171819202122232425262728293031323334353637383940
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. )
  7. func BitBucketClientID() *config.Rule {
  8. // define rule
  9. r := config.Rule{
  10. Description: "Discovered a potential Bitbucket Client ID, risking unauthorized repository access and potential codebase exposure.",
  11. RuleID: "bitbucket-client-id",
  12. Regex: utils.GenerateSemiGenericRegex([]string{"bitbucket"}, utils.AlphaNumeric("32"), true),
  13. Keywords: []string{"bitbucket"},
  14. }
  15. // validate
  16. tps := []string{
  17. utils.GenerateSampleSecret("bitbucket", secrets.NewSecret(utils.AlphaNumeric("32"))),
  18. }
  19. return utils.Validate(r, tps, nil)
  20. }
  21. func BitBucketClientSecret() *config.Rule {
  22. // define rule
  23. r := config.Rule{
  24. Description: "Discovered a potential Bitbucket Client Secret, posing a risk of compromised code repositories and unauthorized access.",
  25. RuleID: "bitbucket-client-secret",
  26. Regex: utils.GenerateSemiGenericRegex([]string{"bitbucket"}, utils.AlphaNumericExtended("64"), true),
  27. Keywords: []string{"bitbucket"},
  28. }
  29. // validate
  30. tps := []string{
  31. utils.GenerateSampleSecret("bitbucket", secrets.NewSecret(utils.AlphaNumeric("64"))),
  32. }
  33. return utils.Validate(r, tps, nil)
  34. }