sendbird.go 1.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. )
  7. func SendbirdAccessToken() *config.Rule {
  8. // define rule
  9. r := config.Rule{
  10. RuleID: "sendbird-access-token",
  11. Description: "Uncovered a Sendbird Access Token, potentially risking unauthorized access to communication services and user data.",
  12. Regex: utils.GenerateSemiGenericRegex([]string{"sendbird"}, utils.Hex("40"), true),
  13. Keywords: []string{
  14. "sendbird",
  15. },
  16. }
  17. // validate
  18. tps := []string{
  19. utils.GenerateSampleSecret("sendbird", secrets.NewSecret(utils.Hex("40"))),
  20. }
  21. return utils.Validate(r, tps, nil)
  22. }
  23. func SendbirdAccessID() *config.Rule {
  24. // define rule
  25. r := config.Rule{
  26. RuleID: "sendbird-access-id",
  27. Description: "Discovered a Sendbird Access ID, which could compromise chat and messaging platform integrations.",
  28. Regex: utils.GenerateSemiGenericRegex([]string{"sendbird"}, utils.Hex8_4_4_4_12(), true),
  29. Keywords: []string{
  30. "sendbird",
  31. },
  32. }
  33. // validate
  34. tps := []string{
  35. utils.GenerateSampleSecret("sendbird", secrets.NewSecret(utils.Hex8_4_4_4_12())),
  36. }
  37. return utils.Validate(r, tps, nil)
  38. }