grafana.go 1.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  4. "github.com/zricethezav/gitleaks/v8/config"
  5. )
  6. func GrafanaApiKey() *config.Rule {
  7. // define rule
  8. r := config.Rule{
  9. Description: "Identified a Grafana API key, which could compromise monitoring dashboards and sensitive data analytics.",
  10. RuleID: "grafana-api-key",
  11. Regex: generateUniqueTokenRegex(`eyJrIjoi[A-Za-z0-9]{70,400}={0,2}`, true),
  12. Keywords: []string{"eyJrIjoi"},
  13. }
  14. // validate
  15. tps := []string{
  16. generateSampleSecret("grafana-api-key",
  17. "eyJrIjoi"+
  18. secrets.NewSecret(alphaNumeric("70"))),
  19. }
  20. return validate(r, tps, nil)
  21. }
  22. func GrafanaCloudApiToken() *config.Rule {
  23. // define rule
  24. r := config.Rule{
  25. Description: "Found a Grafana cloud API token, risking unauthorized access to cloud-based monitoring services and data exposure.",
  26. RuleID: "grafana-cloud-api-token",
  27. Regex: generateUniqueTokenRegex(`glc_[A-Za-z0-9+/]{32,400}={0,2}`, true),
  28. Keywords: []string{"glc_"},
  29. }
  30. // validate
  31. tps := []string{
  32. generateSampleSecret("grafana-cloud-api-token",
  33. "glc_"+
  34. secrets.NewSecret(alphaNumeric("32"))),
  35. }
  36. return validate(r, tps, nil)
  37. }
  38. func GrafanaServiceAccountToken() *config.Rule {
  39. // define rule
  40. r := config.Rule{
  41. Description: "Discovered a Grafana service account token, posing a risk of compromised monitoring services and data integrity.",
  42. RuleID: "grafana-service-account-token",
  43. Regex: generateUniqueTokenRegex(`glsa_[A-Za-z0-9]{32}_[A-Fa-f0-9]{8}`, true),
  44. Keywords: []string{"glsa_"},
  45. }
  46. // validate
  47. tps := []string{
  48. generateSampleSecret("grafana-service-account-token",
  49. "glsa_"+
  50. secrets.NewSecret(alphaNumeric("32"))+
  51. "_"+
  52. secrets.NewSecret((hex("8")))),
  53. }
  54. return validate(r, tps, nil)
  55. }