| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778 |
- package rules
- import (
- "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
- "github.com/zricethezav/gitleaks/v8/cmd/generate/secrets"
- "github.com/zricethezav/gitleaks/v8/config"
- )
- func TwitterAPIKey() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Identified a Twitter API Key, which may compromise Twitter application integrations and user data security.",
- RuleID: "twitter-api-key",
- Regex: utils.GenerateSemiGenericRegex([]string{"twitter"}, utils.AlphaNumeric("25"), true),
- Keywords: []string{"twitter"},
- }
- // validate
- tps := utils.GenerateSampleSecrets("twitter", secrets.NewSecret(utils.AlphaNumeric("25")))
- return utils.Validate(r, tps, nil)
- }
- func TwitterAPISecret() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Found a Twitter API Secret, risking the security of Twitter app integrations and sensitive data access.",
- RuleID: "twitter-api-secret",
- Regex: utils.GenerateSemiGenericRegex([]string{"twitter"}, utils.AlphaNumeric("50"), true),
- Keywords: []string{"twitter"},
- }
- // validate
- tps := utils.GenerateSampleSecrets("twitter", secrets.NewSecret(utils.AlphaNumeric("50")))
- return utils.Validate(r, tps, nil)
- }
- func TwitterBearerToken() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Discovered a Twitter Bearer Token, potentially compromising API access and data retrieval from Twitter.",
- RuleID: "twitter-bearer-token",
- Regex: utils.GenerateSemiGenericRegex([]string{"twitter"}, "A{22}[a-zA-Z0-9%]{80,100}", true),
- Keywords: []string{"twitter"},
- }
- // validate
- tps := utils.GenerateSampleSecrets("twitter", secrets.NewSecret("A{22}[a-zA-Z0-9%]{80,100}"))
- return utils.Validate(r, tps, nil)
- }
- func TwitterAccessToken() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Detected a Twitter Access Token, posing a risk of unauthorized account operations and social media data exposure.",
- RuleID: "twitter-access-token",
- Regex: utils.GenerateSemiGenericRegex([]string{"twitter"}, "[0-9]{15,25}-[a-zA-Z0-9]{20,40}", true),
- Keywords: []string{"twitter"},
- }
- // validate
- tps := utils.GenerateSampleSecrets("twitter", secrets.NewSecret("[0-9]{15,25}-[a-zA-Z0-9]{20,40}"))
- return utils.Validate(r, tps, nil)
- }
- func TwitterAccessSecret() *config.Rule {
- // define rule
- r := config.Rule{
- Description: "Uncovered a Twitter Access Secret, potentially risking unauthorized Twitter integrations and data breaches.",
- RuleID: "twitter-access-secret",
- Regex: utils.GenerateSemiGenericRegex([]string{"twitter"}, utils.AlphaNumeric("45"), true),
- Keywords: []string{"twitter"},
- }
- // validate
- tps := utils.GenerateSampleSecrets("twitter", secrets.NewSecret(utils.AlphaNumeric("45")))
- return utils.Validate(r, tps, nil)
- }
|