facebook.go 2.9 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  4. "github.com/zricethezav/gitleaks/v8/config"
  5. )
  6. // This rule includes both App Secret and Client Access Token
  7. // https://developers.facebook.com/docs/facebook-login/guides/access-tokens/
  8. func FacebookSecret() *config.Rule {
  9. // define rule
  10. r := config.Rule{
  11. Description: "Discovered a Facebook Application secret, posing a risk of unauthorized access to Facebook accounts and personal data exposure.",
  12. RuleID: "facebook-secret",
  13. Regex: generateSemiGenericRegex([]string{"facebook"}, hex("32"), true),
  14. Keywords: []string{"facebook"},
  15. }
  16. // validate
  17. tps := []string{
  18. generateSampleSecret("facebook", secrets.NewSecret(hex("32"))),
  19. `facebook_app_secret = "6dca6432e45d933e13650d1882bd5e69"`, // gitleaks:allow
  20. `facebook_client_access_token: 26f5fd13099f2c1331aafb86f6489692`, // gitleaks:allow
  21. }
  22. return validate(r, tps, nil)
  23. }
  24. // https://developers.facebook.com/docs/facebook-login/guides/access-tokens/#apptokens
  25. func FacebookAccessToken() *config.Rule {
  26. // define rule
  27. r := config.Rule{
  28. Description: "Discovered a Facebook Access Token, posing a risk of unauthorized access to Facebook accounts and personal data exposure.",
  29. RuleID: "facebook-access-token",
  30. Regex: generateUniqueTokenRegex(`\d{15,16}(\||%)[0-9a-z\-_]{27,40}`, true),
  31. }
  32. // validate
  33. tps := []string{
  34. `{"access_token":"911602140448729|AY-lRJZq9BoDLobvAiP25L7RcMg","token_type":"bearer"}`, // gitleaks:allow
  35. `1308742762612587|rhoK1cbv0DOU_RTX_87O4MkX7AI`, // gitleaks:allow
  36. `1477036645700765|wRPf2v3mt2JfMqCLK8n7oltrEmc`, // gitleaks:allow
  37. }
  38. return validate(r, tps, nil)
  39. }
  40. // https://developers.facebook.com/docs/facebook-login/guides/access-tokens/#pagetokens
  41. func FacebookPageAccessToken() *config.Rule {
  42. // define rule
  43. r := config.Rule{
  44. Description: "Discovered a Facebook Page Access Token, posing a risk of unauthorized access to Facebook accounts and personal data exposure.",
  45. RuleID: "facebook-page-access-token",
  46. Regex: generateUniqueTokenRegex("EAA[MC]"+alphaNumeric("20,"), true),
  47. Keywords: []string{"EAAM", "EAAC"},
  48. }
  49. // validate
  50. tps := []string{
  51. `EAAM9GOnCB9kBO2frzOAWGN2zMnZClQshlWydZCrBNdodesbwimx1mfVJgqZBP5RSpMfUzWhtjTTXHG5I1UlvlwRZCgjm3ZBVGeTYiqAAoxyED6HaUdhpGVNoPUwAuAWWFsi9OvyYBQt22DGLqMIgD7VktuCTTZCWKasz81Q822FPhMTB9VFFyClNzQ0NLZClt9zxpsMMrUZCo1VU1rL3CKavir5QTfBjfCEzHNlWAUDUV2YZD`, // gitleaks:allow
  52. `EAAM9GOnCB9kBO2zXpAtRBmCrsPPjdA3KeBl4tqsEpcYd09cpjm9MZCBIklZBjIQBKGIJgFwm8IE17G5pipsfRBRBEHMWxvJsL7iHLUouiprxKRQfAagw8BEEDucceqxTiDhVW2IZAQNNbf0d1JhcapAGntx5S1Csm4j0GgZB3DuUfI2HJ9aViTtdfH2vjBy0wtpXm2iamevohGfoF4NgyRHusDLjqy91uYMkfrkc`, // gitleaks:allow
  53. `- name: FACEBOOK_TOKEN
  54. value: "EAACEdEose0cBA1bad3afsf2aew"`, // gitleaks:allow
  55. }
  56. return validate(r, tps, nil)
  57. }