| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758 |
- package rules
- import (
- "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
- "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
- "github.com/zricethezav/gitleaks/v8/config"
- )
- func MailGunPrivateAPIToken() *config.Rule {
- // define rule
- r := config.Rule{
- RuleID: "mailgun-private-api-token",
- Description: "Found a Mailgun private API token, risking unauthorized email service operations and data breaches.",
- Regex: utils.GenerateSemiGenericRegex([]string{"mailgun"}, `key-[a-f0-9]{32}`, true),
- Keywords: []string{
- "mailgun",
- },
- }
- // validate
- tps := utils.GenerateSampleSecrets("mailgun", "key-"+secrets.NewSecret(utils.Hex("32")))
- return utils.Validate(r, tps, nil)
- }
- func MailGunPubAPIToken() *config.Rule {
- // define rule
- r := config.Rule{
- RuleID: "mailgun-pub-key",
- Description: "Discovered a Mailgun public validation key, which could expose email verification processes and associated data.",
- Regex: utils.GenerateSemiGenericRegex([]string{"mailgun"}, `pubkey-[a-f0-9]{32}`, true),
- Keywords: []string{
- "mailgun",
- },
- }
- // validate
- tps := utils.GenerateSampleSecrets("mailgun", "pubkey-"+secrets.NewSecret(utils.Hex("32")))
- return utils.Validate(r, tps, nil)
- }
- func MailGunSigningKey() *config.Rule {
- // define rule
- r := config.Rule{
- RuleID: "mailgun-signing-key",
- Description: "Uncovered a Mailgun webhook signing key, potentially compromising email automation and data integrity.",
- Regex: utils.GenerateSemiGenericRegex([]string{"mailgun"}, `[a-h0-9]{32}-[a-h0-9]{8}-[a-h0-9]{8}`, true),
- Keywords: []string{
- "mailgun",
- },
- }
- // validate
- tps := utils.GenerateSampleSecrets("mailgun", secrets.NewSecret(utils.Hex("32"))+"-00001111-22223333")
- return utils.Validate(r, tps, nil)
- }
|