intra42.go 1.0 KB

12345678910111213141516171819202122232425262728293031
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. )
  7. func Intra42ClientSecret() *config.Rule {
  8. // define rule
  9. r := config.Rule{
  10. Description: "Found a Intra42 client secret, which could lead to unauthorized access to the 42School API and sensitive data.",
  11. RuleID: "intra42-client-secret",
  12. Regex: utils.GenerateUniqueTokenRegex(`s-s4t2(?:ud|af)-(?i)[abcdef0123456789]{64}`, false),
  13. Entropy: 3,
  14. Keywords: []string{
  15. "intra",
  16. "s-s4t2ud-",
  17. "s-s4t2af-",
  18. },
  19. }
  20. // validate
  21. tps := []string{
  22. "clientSecret := \"s-s4t2ud-" + secrets.NewSecret(utils.Hex("64")) + "\"",
  23. "clientSecret := \"s-s4t2af-" + secrets.NewSecret(utils.Hex("64")) + "\"",
  24. "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", // gitleaks:allow
  25. "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", // gitleaks:allow
  26. }
  27. return utils.Validate(r, tps, nil)
  28. }