square.go 1.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
  1. package rules
  2. import (
  3. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  4. "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. )
  7. func SquareAccessToken() *config.Rule {
  8. // define rule
  9. r := config.Rule{
  10. RuleID: "square-access-token",
  11. Description: "Detected a Square Access Token, risking unauthorized payment processing and financial transaction exposure.",
  12. Regex: utils.GenerateUniqueTokenRegex(`(?:EAAA|sq0atp-)[\w-]{22,60}`, false),
  13. Entropy: 2,
  14. Keywords: []string{"sq0atp-", "EAAA"},
  15. }
  16. // validate
  17. tps := utils.GenerateSampleSecrets("square", secrets.NewSecret(`(?:EAAA|sq0atp-)[\w-]{22,60}`))
  18. tps = append(tps,
  19. "ARG token=sq0atp-812erere3wewew45678901", // gitleaks:allow
  20. "ARG token=EAAAlsBxkkVgvmr7FasTFbM6VUGZ31EJ4jZKTJZySgElBDJ_wyafHuBFquFexY7E", // gitleaks:allow",
  21. )
  22. fps := []string{
  23. `aws-cli@sha256:eaaa7b11777babe28e6133a8b19ff71cea687e0d7f05158dee95a71f76ce3d00`,
  24. }
  25. return utils.Validate(r, tps, fps)
  26. }
  27. func SquareSecret() *config.Rule {
  28. // define rule
  29. r := config.Rule{
  30. RuleID: "square-secret",
  31. Description: "Square Secret",
  32. Regex: utils.GenerateUniqueTokenRegex(`sq0csp-[\w-]{43}`, false),
  33. Entropy: 2,
  34. Keywords: []string{"sq0csp-"},
  35. }
  36. // validate
  37. tps := utils.GenerateSampleSecrets("square", secrets.NewSecret(`sq0csp-[0-9A-Za-z\\-_]{43}`))
  38. tps = append(tps,
  39. `value: "sq0csp-0p9h7g6f4s3s3s3-4a3ardgwa6ADRDJDDKUFYDYDYDY"`, // gitleaks:allow
  40. )
  41. return utils.Validate(r, tps, nil)
  42. }