adobe.go 1.1 KB

1234567891011121314151617181920212223242526272829303132333435363738
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  4. "github.com/zricethezav/gitleaks/v8/config"
  5. )
  6. func AdobeClientID() *config.Rule {
  7. // define rule
  8. r := config.Rule{
  9. Description: "Detected a pattern that resembles an Adobe OAuth Web Client ID, posing a risk of compromised Adobe integrations and data breaches.",
  10. RuleID: "adobe-client-id",
  11. Regex: generateSemiGenericRegex([]string{"adobe"}, hex("32"), true),
  12. Keywords: []string{"adobe"},
  13. }
  14. // validate
  15. tps := []string{
  16. generateSampleSecret("adobe", secrets.NewSecret(hex("32"))),
  17. }
  18. return validate(r, tps, nil)
  19. }
  20. func AdobeClientSecret() *config.Rule {
  21. // define rule
  22. r := config.Rule{
  23. Description: "Discovered a potential Adobe Client Secret, which, if exposed, could allow unauthorized Adobe service access and data manipulation.",
  24. RuleID: "adobe-client-secret",
  25. Regex: generateUniqueTokenRegex(`(p8e-)(?i)[a-z0-9]{32}`, true),
  26. Keywords: []string{"p8e-"},
  27. }
  28. // validate
  29. tps := []string{
  30. "adobeClient := \"p8e-" + secrets.NewSecret(hex("32")) + "\"",
  31. }
  32. return validate(r, tps, nil)
  33. }