| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465 |
- package rules
- import (
- "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
- "github.com/zricethezav/gitleaks/v8/config"
- )
- func GrafanaApiKey() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Identified a Grafana API key, which could compromise monitoring dashboards and sensitive data analytics.",
- RuleID: "grafana-api-key",
- Regex: generateUniqueTokenRegex(`eyJrIjoi[A-Za-z0-9]{70,400}={0,2}`, true),
- Keywords: []string{"eyJrIjoi"},
- }
- // validate
- tps := []string{
- generateSampleSecret("grafana-api-key",
- "eyJrIjoi"+
- secrets.NewSecret(alphaNumeric("70"))),
- }
- return validate(r, tps, nil)
- }
- func GrafanaCloudApiToken() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Found a Grafana cloud API token, risking unauthorized access to cloud-based monitoring services and data exposure.",
- RuleID: "grafana-cloud-api-token",
- Regex: generateUniqueTokenRegex(`glc_[A-Za-z0-9+/]{32,400}={0,2}`, true),
- Keywords: []string{"glc_"},
- }
- // validate
- tps := []string{
- generateSampleSecret("grafana-cloud-api-token",
- "glc_"+
- secrets.NewSecret(alphaNumeric("32"))),
- }
- return validate(r, tps, nil)
- }
- func GrafanaServiceAccountToken() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Discovered a Grafana service account token, posing a risk of compromised monitoring services and data integrity.",
- RuleID: "grafana-service-account-token",
- Regex: generateUniqueTokenRegex(`glsa_[A-Za-z0-9]{32}_[A-Fa-f0-9]{8}`, true),
- Keywords: []string{"glsa_"},
- }
- // validate
- tps := []string{
- generateSampleSecret("grafana-service-account-token",
- "glsa_"+
- secrets.NewSecret(alphaNumeric("32"))+
- "_"+
- secrets.NewSecret((hex("8")))),
- }
- return validate(r, tps, nil)
- }
|