| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657 |
- package rules
- import (
- "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
- "regexp"
- "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
- "github.com/zricethezav/gitleaks/v8/config"
- )
- func GitlabPat() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Identified a GitLab Personal Access Token, risking unauthorized access to GitLab repositories and codebase exposure.",
- RuleID: "gitlab-pat",
- Regex: regexp.MustCompile(`glpat-[0-9a-zA-Z\-\_]{20}`),
- Keywords: []string{"glpat-"},
- }
- // validate
- tps := []string{
- utils.GenerateSampleSecret("gitlab", "glpat-"+secrets.NewSecret(utils.AlphaNumeric("20"))),
- }
- return utils.Validate(r, tps, nil)
- }
- func GitlabPipelineTriggerToken() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Found a GitLab Pipeline Trigger Token, potentially compromising continuous integration workflows and project security.",
- RuleID: "gitlab-ptt",
- Regex: regexp.MustCompile(`glptt-[0-9a-f]{40}`),
- Keywords: []string{"glptt-"},
- }
- // validate
- tps := []string{
- utils.GenerateSampleSecret("gitlab", "glptt-"+secrets.NewSecret(utils.Hex("40"))),
- }
- return utils.Validate(r, tps, nil)
- }
- func GitlabRunnerRegistrationToken() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Discovered a GitLab Runner Registration Token, posing a risk to CI/CD pipeline integrity and unauthorized access.",
- RuleID: "gitlab-rrt",
- Regex: regexp.MustCompile(`GR1348941[0-9a-zA-Z\-\_]{20}`),
- Keywords: []string{"GR1348941"},
- }
- // validate
- tps := []string{
- utils.GenerateSampleSecret("gitlab", "GR1348941"+secrets.NewSecret(utils.AlphaNumeric("20"))),
- }
- return utils.Validate(r, tps, nil)
- }
|