linear.go 1.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940
  1. package rules
  2. import (
  3. regexp "github.com/wasilibs/go-re2"
  4. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  7. )
  8. func LinearAPIToken() *config.Rule {
  9. // define rule
  10. r := config.Rule{
  11. RuleID: "linear-api-key",
  12. Description: "Detected a Linear API Token, posing a risk to project management tools and sensitive task data.",
  13. Regex: regexp.MustCompile(`lin_api_(?i)[a-z0-9]{40}`),
  14. Entropy: 2,
  15. Keywords: []string{"lin_api_"},
  16. }
  17. // validate
  18. tps := utils.GenerateSampleSecrets("linear", "lin_api_"+secrets.NewSecret(utils.AlphaNumeric("40")))
  19. return utils.Validate(r, tps, nil)
  20. }
  21. func LinearClientSecret() *config.Rule {
  22. // define rule
  23. r := config.Rule{
  24. RuleID: "linear-client-secret",
  25. Description: "Identified a Linear Client Secret, which may compromise secure integrations and sensitive project management data.",
  26. Regex: utils.GenerateSemiGenericRegex([]string{"linear"}, utils.Hex("32"), true),
  27. Entropy: 2,
  28. Keywords: []string{"linear"},
  29. }
  30. // validate
  31. tps := utils.GenerateSampleSecrets("linear", secrets.NewSecret(utils.Hex("32")))
  32. return utils.Validate(r, tps, nil)
  33. }