| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455 |
- package rules
- import (
- regexp "github.com/wasilibs/go-re2"
- "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
- "github.com/zricethezav/gitleaks/v8/config"
- "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
- )
- func FlutterwavePublicKey() *config.Rule {
- // define rule
- r := config.Rule{
- RuleID: "flutterwave-public-key",
- Description: "Detected a Finicity Public Key, potentially exposing public cryptographic operations and integrations.",
- Regex: regexp.MustCompile(`FLWPUBK_TEST-(?i)[a-h0-9]{32}-X`),
- Entropy: 2,
- Keywords: []string{"FLWPUBK_TEST"},
- }
- // validate
- tps := utils.GenerateSampleSecrets("flutterwavePubKey", "FLWPUBK_TEST-"+secrets.NewSecret(utils.Hex("32"))+"-X")
- return utils.Validate(r, tps, nil)
- }
- func FlutterwaveSecretKey() *config.Rule {
- // define rule
- r := config.Rule{
- RuleID: "flutterwave-secret-key",
- Description: "Identified a Flutterwave Secret Key, risking unauthorized financial transactions and data breaches.",
- Regex: regexp.MustCompile(`FLWSECK_TEST-(?i)[a-h0-9]{32}-X`),
- Entropy: 2,
- Keywords: []string{"FLWSECK_TEST"},
- }
- // validate
- tps := utils.GenerateSampleSecrets("flutterwavePubKey", "FLWSECK_TEST-"+secrets.NewSecret(utils.Hex("32"))+"-X")
- return utils.Validate(r, tps, nil)
- }
- func FlutterwaveEncKey() *config.Rule {
- // define rule
- r := config.Rule{
- RuleID: "flutterwave-encryption-key",
- Description: "Uncovered a Flutterwave Encryption Key, which may compromise payment processing and sensitive financial information.",
- Regex: regexp.MustCompile(`FLWSECK_TEST-(?i)[a-h0-9]{12}`),
- Entropy: 2,
- Keywords: []string{"FLWSECK_TEST"},
- }
- // validate
- tps := utils.GenerateSampleSecrets("flutterwavePubKey", "FLWSECK_TEST-"+secrets.NewSecret(utils.Hex("12")))
- return utils.Validate(r, tps, nil)
- }
|