| 12345678910111213141516171819202122232425262728293031323334353637383940 |
- package rules
- import (
- "regexp"
- "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
- "github.com/zricethezav/gitleaks/v8/config"
- )
- func LinearAPIToken() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Detected a Linear API Token, posing a risk to project management tools and sensitive task data.",
- RuleID: "linear-api-key",
- Regex: regexp.MustCompile(`lin_api_(?i)[a-z0-9]{40}`),
- Keywords: []string{"lin_api_"},
- }
- // validate
- tps := []string{
- generateSampleSecret("linear", "lin_api_"+secrets.NewSecret(alphaNumeric("40"))),
- }
- return validate(r, tps, nil)
- }
- func LinearClientSecret() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Identified a Linear Client Secret, which may compromise secure integrations and sensitive project management data.",
- RuleID: "linear-client-secret",
- Regex: generateSemiGenericRegex([]string{"linear"}, hex("32"), true),
- Keywords: []string{"linear"},
- }
- // validate
- tps := []string{
- generateSampleSecret("linear", secrets.NewSecret(hex("32"))),
- }
- return validate(r, tps, nil)
- }
|