sumologic.go 3.0 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "regexp"
  5. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  6. "github.com/zricethezav/gitleaks/v8/config"
  7. )
  8. func SumoLogicAccessID() *config.Rule {
  9. // define rule
  10. r := config.Rule{
  11. RuleID: "sumologic-access-id",
  12. Description: "Discovered a SumoLogic Access ID, potentially compromising log management services and data analytics integrity.",
  13. // TODO: Make 'su' case-sensitive.
  14. Regex: utils.GenerateSemiGenericRegex([]string{"sumo"},
  15. "su[a-zA-Z0-9]{12}", false),
  16. Entropy: 3,
  17. Keywords: []string{
  18. "sumo",
  19. },
  20. Allowlist: config.Allowlist{
  21. RegexTarget: "line",
  22. Regexes: []*regexp.Regexp{
  23. regexp.MustCompile(`sumOf`),
  24. },
  25. },
  26. }
  27. // validate
  28. tps := []string{
  29. `sumologic.accessId = "su9OL59biWiJu7"`, // gitleaks:allow
  30. `sumologic_access_id = "sug5XpdpaoxtOH"`, // gitleaks:allow
  31. `export SUMOLOGIC_ACCESSID="suDbJw97o9WVo0"`, // gitleaks:allow
  32. `SUMO_ACCESS_ID = "suGyI5imvADdvU"`, // gitleaks:allow
  33. utils.GenerateSampleSecret("sumo", "su"+secrets.NewSecret(utils.AlphaNumeric("12"))),
  34. }
  35. fps := []string{
  36. `- (NSNumber *)sumOfProperty:(NSString *)property;`,
  37. `- (NSInteger)sumOfValuesInRange:(NSRange)range;`,
  38. `+ (unsigned char)byteChecksumOfData:(id)arg1;`,
  39. `sumOfExposures = sumOfExposures;`, // gitleaks:allow
  40. `.si-sumologic.si--color::before { color: #000099; }`,
  41. `/// Based on the SumoLogic keyword syntax:`,
  42. `sumologic_access_id = ""`,
  43. `SUMOLOGIC_ACCESSID: ${SUMOLOGIC_ACCESSID}`,
  44. `export SUMOLOGIC_ACCESSID=XXXXXXXXXXXXXX`, // gitleaks:allow
  45. }
  46. return utils.Validate(r, tps, fps)
  47. }
  48. func SumoLogicAccessToken() *config.Rule {
  49. // define rule
  50. r := config.Rule{
  51. RuleID: "sumologic-access-token",
  52. Description: "Uncovered a SumoLogic Access Token, which could lead to unauthorized access to log data and analytics insights.",
  53. Regex: utils.GenerateSemiGenericRegex([]string{"sumo"},
  54. utils.AlphaNumeric("64"), true),
  55. Entropy: 3,
  56. Keywords: []string{
  57. "sumo",
  58. },
  59. }
  60. // validate
  61. tps := []string{
  62. `export SUMOLOGIC_ACCESSKEY="3HSa1hQfz6BYzlxf7Yb1WKG3Hyovm56LMFChV2y9LgkRipsXCujcLb5ej3oQUJlx"`, // gitleaks:allow
  63. `SUMO_ACCESS_KEY: gxq3rJQkS6qovOg9UY2Q70iH1jFZx0WBrrsiAYv4XHodogAwTKyLzvFK4neRN8Dk`, // gitleaks:allow
  64. `SUMOLOGIC_ACCESSKEY: 9RITWb3I3kAnSyUolcVJq4gwM17JRnQK8ugRaixFfxkdSl8ys17ZtEL3LotESKB7`, // gitleaks:allow
  65. `sumo_access_key = "3Kof2VffNQ0QgYIhXUPJosVlCaQKm2hfpWE6F1fT9YGY74blQBIPsrkCcf1TwKE5"`, // gitleaks:allow
  66. utils.GenerateSampleSecret("sumo", secrets.NewSecret(utils.AlphaNumeric("64"))),
  67. }
  68. fps := []string{
  69. `# SUMO_ACCESS_KEY=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx`, // gitleaks:allow
  70. "-e SUMO_ACCESS_KEY=`etcdctl get /sumologic_secret`",
  71. `SUMO_ACCESS_KEY={SumoAccessKey}`,
  72. `SUMO_ACCESS_KEY=${SUMO_ACCESS_KEY:=$2}`,
  73. `sumo_access_key = "<SUMOLOGIC ACCESS KEY>"`,
  74. `SUMO_ACCESS_KEY: AbCeFG123`,
  75. }
  76. return utils.Validate(r, tps, fps)
  77. }