okta.go 1.1 KB

12345678910111213141516171819202122232425262728293031323334
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. )
  7. func OktaAccessToken() *config.Rule {
  8. // define rule
  9. r := config.Rule{
  10. RuleID: "okta-access-token",
  11. Description: "Identified an Okta Access Token, which may compromise identity management services and user authentication data.",
  12. Regex: utils.GenerateSemiGenericRegex([]string{`(?-i:[Oo]kta|OKTA)`}, `00[\w=\-]{40}`, false),
  13. Entropy: 4,
  14. Keywords: []string{
  15. "okta",
  16. },
  17. }
  18. // validate
  19. tps := utils.GenerateSampleSecrets("okta", secrets.NewSecret(`00[\w=\-]{40}`))
  20. tps = append(tps,
  21. `"oktaApiToken": "00ebObu4zSNkyc6dimLvUwq4KpTEop-PCEnnfSTpD3",`, // gitleaks:allow
  22. ` var OktaApiToken = "00fWkOjwwL9xiFd-Vfgm_ePATIRxVj852Iblbb1DS_";`, // gitleaks:allow
  23. )
  24. fps := []string{
  25. `oktaKey = 00000000000000000000000000000000000TUVWXYZ`, // low entropy
  26. `rookTable = 0023452Lllk2KqjLBvaxANWEgTd7bqjsxjo8aZj0wd`, // wrong case
  27. }
  28. return utils.Validate(r, tps, fps)
  29. }
  30. // TODO: Okta client secret?