No Description

Zachary Rice f58caef16d Merge pull request #29 from loicbourgois/patch-1 8 years ago
vendor 744ff2f876 deps 8 years ago
.travis.yml 4ea51fc98d go 1.9 and travis badge 8 years ago
Gopkg.lock 744ff2f876 deps 8 years ago
Gopkg.toml 744ff2f876 deps 8 years ago
LICENSE d70dded366 Create LICENSE 8 years ago
README.md c0797d115a Update README.md 8 years ago
checks.go bc26e979c5 shannon entropy for base64 and hex, more options 8 years ago
checks_test.go bc26e979c5 shannon entropy for base64 and hex, more options 8 years ago
leaks.go 4a7875bb38 remove unnecessary operation to get current working directory 8 years ago
leaks_test.go a9c5d5a953 Code cleanup and badges 8 years ago
main.go bc26e979c5 shannon entropy for base64 and hex, more options 8 years ago
options.go c0bf19fc44 updating readme and options 8 years ago

README.md

GitLeaks

Build Status godoc GolangCI

Check git repos for secrets and keys

Features

  • Search all commits on all branches in topological order
  • Regex/Entropy checks

Installing

go get -u github.com/zricethezav/gitleaks

Usage and Explanation

Alt Text

./gitleaks {git url}

This example will clone the target {git url} and run a diff on all commits. A report will be outputted to {repo_name}_leaks.json Gitleaks scans all lines of all commits and checks if there are any regular expression matches. The regexs are defined in main.go. For example if a line in a commit diff like AWS_KEY='AKAI...' exists then the value after the assignment operator will be checked for entropy. If the value is above a certain entropy threshold then we assume that the line contains a key/secret. Work largely based on https://people.eecs.berkeley.edu/~rohanpadhye/files/key_leaks-msr15.pdf and https://github.com/dxa4481/truffleHog.

gitLeaks User
./gitleaks -u {user git url}
gitLeaks Org
./gitleaks -o {org git url}

Help

usage: gitleaks [options] [git url]


Options:
	-c 			Concurrency factor (potential number of git files open)
	-u 		 	Git user url
	-r 			Git repo url
	-o 			Git organization url
	-s 			Strict mode uses stopwords in checks.go
	-e 			Base64 entropy cutoff, default is 70
	-x 			Hex entropy cutoff, default is 40
	-h --help 		Display this message

NOTE: your mileage may vary so if you aren't getting the results you expected try tweaking the entropy cutoffs and stopwords. Entropy cutoff for base64 alphabets seemed to give good results around 70 and hex alphabets seemed to give good results around 40. Entropy is calculated using Shannon entropy.

If you find a valid leak in a repo

Please read the Github article on removing sensitive data from a repository to remove the sensitive information from your history.

TODO

  • Specify a target branch
  • Support for custom regex
  • Filter regex
  • Modify entropy cutoff