-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: use gitleaks for secret scanning #610
Conversation
test_git_leaks_ci.txt
Outdated
@@ -0,0 +1 @@ | |||
PASSWORD=410871d6-c66f-4052-83d7-78add2a56e2b |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id generic-api-key
in commit c7b2e4a.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore
file and commit the change to this branch.
echo c7b2e4ae3cde679f36228101162a8a63ac91e576:test_git_leaks_ci.txt:generic-api-key:1 >> .gitleaksignore
be64130
to
db1ca1a
Compare
test_git_leaks_ci.txt
Outdated
@@ -0,0 +1 @@ | |||
PASSWORD=410871d6-c66f-4052-83d7-78add2a56e2b |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id generic-api-key
in commit c7b2e4a.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore
file and commit the change to this branch.
echo c7b2e4ae3cde679f36228101162a8a63ac91e576:test_git_leaks_ci.txt:generic-api-key:1 >> .gitleaksignore
test_git_leaks_ci.txt
Outdated
@@ -0,0 +1 @@ | |||
PASSWORD=410871d6-c66f-4052-83d7-78add2a56e2b |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id generic-api-key
in commit c7b2e4a.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore
file and commit the change to this branch.
echo c7b2e4ae3cde679f36228101162a8a63ac91e576:test_git_leaks_ci.txt:generic-api-key:1 >> .gitleaksignore
cc @rudderlabs/security-alerts
3dfe332
to
3686447
Compare
@@ -0,0 +1,14 @@ | |||
f0b67e93831d16b7f6618632ad44d718c8318b87:sftp/testdata/ssh/test_key:private-key:1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I merged a PR a while back to remove these. Are you sure some of these lines are still relevant? Last time I removed all the RSA keys. Of course it will still complain about the certificates though.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It is still part of git history, running secret scanning on the latest didn't detect anything. The work to remove RSA keys is still important to avoid false positives moving forward.
Description
Makefile
Add
sec
on target on Makefile:sec also runs as part of
make lint
.gitleaksignore
is used to skip already-known secretsGithub action
Using official
gitleaks-action
, some notes:GITLEAKS_LICENSE: ${{ secrets.GITLEAKS_LICENSE }}
. This is required since we are an org. TheGITLEAKS_LICENSE
is configured on the org level.GITLEAKS_NOTIFY_USER_LIST
is setup to notify@rudderlabs/security-alerts
alias.The workflow is configured to be triggered in multiple ways:
Linear Ticket
https://linear.app/rudderstack/issue/PRI-36/use-gitleaks-for-secret-scanning
Refs PRI-36
Security