Documentation ¶
Index ¶
- Constants
- Variables
- func GetFalsePositiveCheck(detector Detector) func(Result) (bool, string)
- func HasDigit(key string) bool
- func IsKnownFalsePositive(match string, falsePositives []FalsePositive, wordCheck bool) (bool, string)
- func KeyIsRandom(key string) bool
- func MustGetBenchmarkData() map[string][]byte
- func NewDetectorHttpClient(opts ...ClientOption) *http.Client
- func NewDetectorTransport(userAgent string, T http.RoundTripper) http.RoundTripper
- func ParseURLAndStripPathAndParams(u string) (*url.URL, error)
- func PrefixRegex(keywords []string) string
- func RedactURL(u url.URL) string
- func StringShannonEntropy(input string) float64
- type ClientOption
- type CustomFalsePositiveChecker
- type CustomMultiPartCredentialProvider
- type DefaultMultiPartCredentialProvider
- type Detector
- type EndpointCustomizer
- type EndpointSetter
- type FalsePositive
- type MaxSecretSizeProvider
- type MultiPartCredentialProvider
- type Result
- type ResultWithMetadata
- type StartOffsetProvider
- type Versioner
Constants ¶
const DefaultResponseTimeout = 5 * time.Second
const DefaultUserAgent = "TruffleHog"
Variables ¶
var DefaultFalsePositives = []FalsePositive{"example", "xxxxxx", "aaaaaa", "abcde", "00000", "sample", "*****"}
var DetectorHttpClientWithLocalAddresses *http.Client
var DetectorHttpClientWithNoLocalAddresses *http.Client
var ErrNoLocalIP = errors.New("dialing local IP addresses is not allowed")
Functions ¶
func GetFalsePositiveCheck ¶ added in v3.75.0
func IsKnownFalsePositive ¶
func IsKnownFalsePositive(match string, falsePositives []FalsePositive, wordCheck bool) (bool, string)
IsKnownFalsePositive returns whether a finding is (likely) a known false positive, and the reason for the detection.
Currently, this includes: english word in key or matches common example patterns. Only the secret key material should be passed into this function
func KeyIsRandom ¶
KeyIsRandom is a Low cost check to make sure that 'keys' include a number to reduce FPs. Golang doesn't support regex lookaheads, so must be done in separate calls. TODO improve checks. Shannon entropy did not work well.
func MustGetBenchmarkData ¶
func NewDetectorHttpClient ¶ added in v3.81.9
func NewDetectorHttpClient(opts ...ClientOption) *http.Client
func NewDetectorTransport ¶ added in v3.81.9
func NewDetectorTransport(userAgent string, T http.RoundTripper) http.RoundTripper
func ParseURLAndStripPathAndParams ¶ added in v3.81.9
func PrefixRegex ¶
PrefixRegex ensures that at least one of the given keywords is within 40 characters of the capturing group that follows. This can help prevent false positives.
func StringShannonEntropy ¶ added in v3.60.0
Types ¶
type ClientOption ¶ added in v3.81.9
ClientOption defines a function type that modifies an http.Client.
func WithNoFollowRedirects ¶ added in v3.81.9
func WithNoFollowRedirects() ClientOption
WithNoFollowRedirects allows disabling automatic following of redirects.
func WithNoLocalIP ¶ added in v3.81.9
func WithNoLocalIP() ClientOption
func WithTimeout ¶ added in v3.81.9
func WithTimeout(timeout time.Duration) ClientOption
WithTimeout sets a timeout for the http.Client.
func WithTransport ¶ added in v3.81.9
func WithTransport(transport http.RoundTripper) ClientOption
WithTransport sets a custom transport for the http.Client.
type CustomFalsePositiveChecker ¶ added in v3.75.0
type CustomMultiPartCredentialProvider ¶ added in v3.78.1
type CustomMultiPartCredentialProvider struct {
// contains filtered or unexported fields
}
func NewCustomMultiPartCredentialProvider ¶ added in v3.78.1
func NewCustomMultiPartCredentialProvider(maxCredentialSpan int64) *CustomMultiPartCredentialProvider
NewCustomMultiPartCredentialProvider creates a new instance of CustomMultiPartCredentialProvider with the specified maximum credential span.
func (CustomMultiPartCredentialProvider) MaxCredentialSpan ¶ added in v3.78.1
func (d CustomMultiPartCredentialProvider) MaxCredentialSpan() int64
MaxCredentialSpan returns the custom maximum credential span specified during the creation of the CustomMultiPartCredentialProvider.
type DefaultMultiPartCredentialProvider ¶ added in v3.78.1
type DefaultMultiPartCredentialProvider struct{}
func (DefaultMultiPartCredentialProvider) MaxCredentialSpan ¶ added in v3.78.1
func (d DefaultMultiPartCredentialProvider) MaxCredentialSpan() int64
MaxCredentialSpan returns the default maximum credential span of 1024 for the DefaultMultiPartCredentialProvider.
type Detector ¶
type Detector interface { // FromData will scan bytes for results, and optionally verify them. FromData(ctx context.Context, verify bool, data []byte) ([]Result, error) // Keywords are used for efficiently pre-filtering chunks using substring operations. // Use unique identifiers that are part of the secret if you can, or the provider name. Keywords() []string // Type returns the DetectorType number from detectors.proto for the given detector. Type() detectorspb.DetectorType }
Detector defines an interface for scanning for and verifying secrets.
type EndpointCustomizer ¶ added in v3.34.0
EndpointCustomizer is an optional interface that a detector can implement to support verifying against user-supplied endpoints.
type EndpointSetter ¶ added in v3.34.0
type EndpointSetter struct {
// contains filtered or unexported fields
}
EndpointSetter implements a sensible default for the SetEndpoints function of the EndpointCustomizer interface. A detector can embed this struct to gain the functionality.
func (*EndpointSetter) Endpoints ¶ added in v3.34.0
func (e *EndpointSetter) Endpoints(defaultEndpoint string) []string
func (*EndpointSetter) SetEndpoints ¶ added in v3.34.0
func (e *EndpointSetter) SetEndpoints(endpoints ...string) error
type FalsePositive ¶
type FalsePositive string
type MaxSecretSizeProvider ¶ added in v3.78.1
type MaxSecretSizeProvider interface {
MaxSecretSize() int64
}
MaxSecretSizeProvider is an optional interface that a detector can implement to provide a custom max size for the secret it finds.
type MultiPartCredentialProvider ¶ added in v3.78.1
type MultiPartCredentialProvider interface { // MaxCredentialSpan returns the maximum span or range of characters that the // detector should consider when searching for a multi-part credential. MaxCredentialSpan() int64 }
MultiPartCredentialProvider is an optional interface that a detector can implement to indicate its compatibility with multi-part credentials and provide the maximum secret size for the credential it finds.
type Result ¶
type Result struct { // DetectorType is the type of Detector. DetectorType detectorspb.DetectorType // DetectorName is the name of the Detector. Used for custom detectors. DetectorName string // DecoderType is the type of Decoder. DecoderType detectorspb.DecoderType Verified bool // Raw contains the raw secret identifier data. Prefer IDs over secrets since it is used for deduping after hashing. Raw []byte // RawV2 contains the raw secret identifier that is a combination of both the ID and the secret. // This is used for secrets that are multi part and could have the same ID. Ex: AWS credentials RawV2 []byte // Redacted contains the redacted version of the raw secret identification data for display purposes. // A secret ID should be used if available. Redacted string ExtraData map[string]string StructuredData *detectorspb.StructuredData // AnalysisInfo should be set with information required for credential // analysis to run. The keys of the map are analyzer specific and // should match what is expected in the corresponding analyzer. AnalysisInfo map[string]string // contains filtered or unexported fields }
func CleanResults ¶
CleanResults returns all verified secrets, and if there are no verified secrets, just one unverified secret if there are any.
func FilterKnownFalsePositives ¶ added in v3.74.0
FilterKnownFalsePositives filters out known false positives from the results.
func FilterResultsWithEntropy ¶ added in v3.60.0
func FilterResultsWithEntropy(ctx context.Context, results []Result, entropy float64, shouldLog bool) []Result
FilterResultsWithEntropy filters out determinately unverified results that have a shannon entropy below the given value.
func (*Result) SetVerificationError ¶ added in v3.63.2
SetVerificationError is the only way to set a verification error. Any sensitive values should be passed-in as secrets to be redacted.
func (*Result) VerificationError ¶ added in v3.44.0
Public accessors for the fields could also be provided if needed.
type ResultWithMetadata ¶
type ResultWithMetadata struct { // IsWordlistFalsePositive indicates whether this secret was flagged as a false positive based on a wordlist check IsWordlistFalsePositive bool // SourceMetadata contains source-specific contextual information. SourceMetadata *source_metadatapb.MetaData // SourceID is the ID of the source that the API uses to map secrets to specific sources. SourceID sources.SourceID // JobID is the ID of the job that the API uses to map secrets to specific jobs. JobID sources.JobID // SecretID is the ID of the secret, if it exists. // Only secrets that are being reverified will have a SecretID. SecretID int64 // SourceType is the type of Source. SourceType sourcespb.SourceType // SourceName is the name of the Source. SourceName string Result // Data from the sources.Chunk which this result was emitted for Data []byte }
func CopyMetadata ¶
func CopyMetadata(chunk *sources.Chunk, result Result) ResultWithMetadata
CopyMetadata returns a detector result with included metadata from the source chunk.
type StartOffsetProvider ¶ added in v3.78.1
type StartOffsetProvider interface {
StartOffset() int64
}
StartOffsetProvider is an optional interface that a detector can implement to provide a custom start offset for the secret it finds.
Source Files ¶
Directories ¶
Path | Synopsis |
---|---|
atlassian
|
|
dockerhub
|
|
elevenlabs
|
|
figmapersonalaccesstoken
|
|
fullstory
|
|
github
|
|
gitlab
|
|
jiratoken
|
|
maxmindlicense
|
|
twitter
|
|