digitalocean.go 1.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  4. "github.com/zricethezav/gitleaks/v8/config"
  5. )
  6. func DigitalOceanPAT() *config.Rule {
  7. r := config.Rule{
  8. Description: "Discovered a DigitalOcean Personal Access Token, posing a threat to cloud infrastructure security and data privacy.",
  9. RuleID: "digitalocean-pat",
  10. Regex: generateUniqueTokenRegex(`dop_v1_[a-f0-9]{64}`, true),
  11. Keywords: []string{"dop_v1_"},
  12. }
  13. tps := []string{
  14. generateSampleSecret("do", "dop_v1_"+secrets.NewSecret(hex("64"))),
  15. }
  16. return validate(r, tps, nil)
  17. }
  18. func DigitalOceanOAuthToken() *config.Rule {
  19. r := config.Rule{
  20. Description: "Found a DigitalOcean OAuth Access Token, risking unauthorized cloud resource access and data compromise.",
  21. RuleID: "digitalocean-access-token",
  22. Regex: generateUniqueTokenRegex(`doo_v1_[a-f0-9]{64}`, true),
  23. Keywords: []string{"doo_v1_"},
  24. }
  25. tps := []string{
  26. generateSampleSecret("do", "doo_v1_"+secrets.NewSecret(hex("64"))),
  27. }
  28. return validate(r, tps, nil)
  29. }
  30. func DigitalOceanRefreshToken() *config.Rule {
  31. r := config.Rule{
  32. Description: "Uncovered a DigitalOcean OAuth Refresh Token, which could allow prolonged unauthorized access and resource manipulation.",
  33. RuleID: "digitalocean-refresh-token",
  34. Regex: generateUniqueTokenRegex(`dor_v1_[a-f0-9]{64}`, true),
  35. Keywords: []string{"dor_v1_"},
  36. }
  37. tps := []string{
  38. generateSampleSecret("do", "dor_v1_"+secrets.NewSecret(hex("64"))),
  39. }
  40. return validate(r, tps, nil)
  41. }