Tidak Ada Deskripsi

Zachary Rice f58caef16d Merge pull request #29 from loicbourgois/patch-1 8 tahun lalu
vendor 744ff2f876 deps 8 tahun lalu
.travis.yml 4ea51fc98d go 1.9 and travis badge 8 tahun lalu
Gopkg.lock 744ff2f876 deps 8 tahun lalu
Gopkg.toml 744ff2f876 deps 8 tahun lalu
LICENSE d70dded366 Create LICENSE 8 tahun lalu
README.md c0797d115a Update README.md 8 tahun lalu
checks.go bc26e979c5 shannon entropy for base64 and hex, more options 8 tahun lalu
checks_test.go bc26e979c5 shannon entropy for base64 and hex, more options 8 tahun lalu
leaks.go 4a7875bb38 remove unnecessary operation to get current working directory 8 tahun lalu
leaks_test.go a9c5d5a953 Code cleanup and badges 8 tahun lalu
main.go bc26e979c5 shannon entropy for base64 and hex, more options 8 tahun lalu
options.go c0bf19fc44 updating readme and options 8 tahun lalu

README.md

GitLeaks

Build Status godoc GolangCI

Check git repos for secrets and keys

Features

  • Search all commits on all branches in topological order
  • Regex/Entropy checks

Installing

go get -u github.com/zricethezav/gitleaks

Usage and Explanation

Alt Text

./gitleaks {git url}

This example will clone the target {git url} and run a diff on all commits. A report will be outputted to {repo_name}_leaks.json Gitleaks scans all lines of all commits and checks if there are any regular expression matches. The regexs are defined in main.go. For example if a line in a commit diff like AWS_KEY='AKAI...' exists then the value after the assignment operator will be checked for entropy. If the value is above a certain entropy threshold then we assume that the line contains a key/secret. Work largely based on https://people.eecs.berkeley.edu/~rohanpadhye/files/key_leaks-msr15.pdf and https://github.com/dxa4481/truffleHog.

gitLeaks User
./gitleaks -u {user git url}
gitLeaks Org
./gitleaks -o {org git url}

Help

usage: gitleaks [options] [git url]


Options:
	-c 			Concurrency factor (potential number of git files open)
	-u 		 	Git user url
	-r 			Git repo url
	-o 			Git organization url
	-s 			Strict mode uses stopwords in checks.go
	-e 			Base64 entropy cutoff, default is 70
	-x 			Hex entropy cutoff, default is 40
	-h --help 		Display this message

NOTE: your mileage may vary so if you aren't getting the results you expected try tweaking the entropy cutoffs and stopwords. Entropy cutoff for base64 alphabets seemed to give good results around 70 and hex alphabets seemed to give good results around 40. Entropy is calculated using Shannon entropy.

If you find a valid leak in a repo

Please read the Github article on removing sensitive data from a repository to remove the sensitive information from your history.

TODO

  • Specify a target branch
  • Support for custom regex
  • Filter regex
  • Modify entropy cutoff