facebook.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. )
  7. // This rule includes both App Secret and Client Access Token
  8. // https://developers.facebook.com/docs/facebook-login/guides/access-tokens/
  9. func FacebookSecret() *config.Rule {
  10. // define rule
  11. r := config.Rule{
  12. Description: "Discovered a Facebook Application secret, posing a risk of unauthorized access to Facebook accounts and personal data exposure.",
  13. RuleID: "facebook-secret",
  14. Regex: utils.GenerateSemiGenericRegex([]string{"facebook"}, utils.Hex("32"), true),
  15. Keywords: []string{"facebook"},
  16. }
  17. // validate
  18. tps := []string{
  19. utils.GenerateSampleSecret("facebook", secrets.NewSecret(utils.Hex("32"))),
  20. `facebook_app_secret = "6dca6432e45d933e13650d1882bd5e69"`, // gitleaks:allow
  21. `facebook_client_access_token: 26f5fd13099f2c1331aafb86f6489692`, // gitleaks:allow
  22. }
  23. return utils.Validate(r, tps, nil)
  24. }
  25. // https://developers.facebook.com/docs/facebook-login/guides/access-tokens/#apptokens
  26. func FacebookAccessToken() *config.Rule {
  27. // define rule
  28. r := config.Rule{
  29. Description: "Discovered a Facebook Access Token, posing a risk of unauthorized access to Facebook accounts and personal data exposure.",
  30. RuleID: "facebook-access-token",
  31. Regex: utils.GenerateUniqueTokenRegex(`\d{15,16}(\||%)[0-9a-z\-_]{27,40}`, true),
  32. }
  33. // validate
  34. tps := []string{
  35. `{"access_token":"911602140448729|AY-lRJZq9BoDLobvAiP25L7RcMg","token_type":"bearer"}`, // gitleaks:allow
  36. `1308742762612587|rhoK1cbv0DOU_RTX_87O4MkX7AI`, // gitleaks:allow
  37. `1477036645700765|wRPf2v3mt2JfMqCLK8n7oltrEmc`, // gitleaks:allow
  38. }
  39. return utils.Validate(r, tps, nil)
  40. }
  41. // https://developers.facebook.com/docs/facebook-login/guides/access-tokens/#pagetokens
  42. func FacebookPageAccessToken() *config.Rule {
  43. // define rule
  44. r := config.Rule{
  45. Description: "Discovered a Facebook Page Access Token, posing a risk of unauthorized access to Facebook accounts and personal data exposure.",
  46. RuleID: "facebook-page-access-token",
  47. Regex: utils.GenerateUniqueTokenRegex("EAA[MC]"+utils.AlphaNumeric("20,"), true),
  48. Keywords: []string{"EAAM", "EAAC"},
  49. }
  50. // validate
  51. tps := []string{
  52. `EAAM9GOnCB9kBO2frzOAWGN2zMnZClQshlWydZCrBNdodesbwimx1mfVJgqZBP5RSpMfUzWhtjTTXHG5I1UlvlwRZCgjm3ZBVGeTYiqAAoxyED6HaUdhpGVNoPUwAuAWWFsi9OvyYBQt22DGLqMIgD7VktuCTTZCWKasz81Q822FPhMTB9VFFyClNzQ0NLZClt9zxpsMMrUZCo1VU1rL3CKavir5QTfBjfCEzHNlWAUDUV2YZD`, // gitleaks:allow
  53. `EAAM9GOnCB9kBO2zXpAtRBmCrsPPjdA3KeBl4tqsEpcYd09cpjm9MZCBIklZBjIQBKGIJgFwm8IE17G5pipsfRBRBEHMWxvJsL7iHLUouiprxKRQfAagw8BEEDucceqxTiDhVW2IZAQNNbf0d1JhcapAGntx5S1Csm4j0GgZB3DuUfI2HJ9aViTtdfH2vjBy0wtpXm2iamevohGfoF4NgyRHusDLjqy91uYMkfrkc`, // gitleaks:allow
  54. `- name: FACEBOOK_TOKEN
  55. value: "EAACEdEose0cBA1bad3afsf2aew"`, // gitleaks:allow
  56. }
  57. return utils.Validate(r, tps, nil)
  58. }