gitlab.go 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "regexp"
  5. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  6. "github.com/zricethezav/gitleaks/v8/config"
  7. )
  8. func GitlabPat() *config.Rule {
  9. // define rule
  10. r := config.Rule{
  11. Description: "Identified a GitLab Personal Access Token, risking unauthorized access to GitLab repositories and codebase exposure.",
  12. RuleID: "gitlab-pat",
  13. Regex: regexp.MustCompile(`glpat-[0-9a-zA-Z\-\_]{20}`),
  14. Keywords: []string{"glpat-"},
  15. }
  16. // validate
  17. tps := []string{
  18. utils.GenerateSampleSecret("gitlab", "glpat-"+secrets.NewSecret(utils.AlphaNumeric("20"))),
  19. }
  20. return utils.Validate(r, tps, nil)
  21. }
  22. func GitlabPipelineTriggerToken() *config.Rule {
  23. // define rule
  24. r := config.Rule{
  25. Description: "Found a GitLab Pipeline Trigger Token, potentially compromising continuous integration workflows and project security.",
  26. RuleID: "gitlab-ptt",
  27. Regex: regexp.MustCompile(`glptt-[0-9a-f]{40}`),
  28. Keywords: []string{"glptt-"},
  29. }
  30. // validate
  31. tps := []string{
  32. utils.GenerateSampleSecret("gitlab", "glptt-"+secrets.NewSecret(utils.Hex("40"))),
  33. }
  34. return utils.Validate(r, tps, nil)
  35. }
  36. func GitlabRunnerRegistrationToken() *config.Rule {
  37. // define rule
  38. r := config.Rule{
  39. Description: "Discovered a GitLab Runner Registration Token, posing a risk to CI/CD pipeline integrity and unauthorized access.",
  40. RuleID: "gitlab-rrt",
  41. Regex: regexp.MustCompile(`GR1348941[0-9a-zA-Z\-\_]{20}`),
  42. Keywords: []string{"GR1348941"},
  43. }
  44. // validate
  45. tps := []string{
  46. utils.GenerateSampleSecret("gitlab", "GR1348941"+secrets.NewSecret(utils.AlphaNumeric("20"))),
  47. }
  48. return utils.Validate(r, tps, nil)
  49. }