chore(deps): update zricethezav/gitleaks docker tag to v8.28.0 #8
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "renovate/zricethezav-gitleaks-8.x"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This PR contains the following updates:
v8.24.3->v8.28.0Release Notes
gitleaks/gitleaks (zricethezav/gitleaks)
v8.28.0Compare Source
Changelog
4fb4382cant countb1c9c7eComposite rules (#1905)72977e4feat: add Anthropic API key detection (#1910)7b02c98fix(git): handle port (#1912)2a7bcffdont prematurely calculate fragment newlines (#1909)bd79c3efeat(allowlist): promote optimizations (#1908)7fb4edaFix: CVEs on go and go crypto (#1868)a044b81feat: add artifactory reference token and api key detection (#1906)bf380d4sillyf487f85Update gitleaks.yml958f55aadd just like that, no leaksOptimizations
#1909 waits to find newlines until a match. This ends up saving a boat load of time since before we were finding newlines for every fragment regardless if a rule matched or not.
#1908 promoted @rgmz excellent stopword optimization
Composite Rules (Multi-part or
requiredRules) #1905In v8.28.0 Gitleaks introduced composite rules, which are made up of a single "primary" rule and one or more auxiliary or
requiredrules. To create a composite rule, add a[[rules.required]]table to the primary rule specifying anidand optionallywithinLinesand/orwithinColumnsproximity constraints. A fragment is a chunk of content that Gitleaks processes at once (typically a file, part of a file, or git diff), and proximity matching instructs the primary rule to only report a finding if the auxiliaryrequiredrules also find matches within the specified area of the fragment.Proximity matching: Using the
withinLinesandwithinColumnsfields instructs the primary rule to only report a finding if the auxiliaryrequiredrules also find matches within the specified proximity. You can set:withinLines: N- required findings must be within N lines (vertically)withinColumns: N- required findings must be within N characters (horizontally)Here are diagrams illustrating each proximity behavior:
v8.27.2Compare Source
Changelog
c7acf33Merge branch 'master' of github.com:gitleaks/gitleaks9faaa4aAdd experimental allowlist optimizations (#1731)79068b3Detect Notion Public API Keys #1889 (#1890)v8.27.0Compare Source
Changelog
782f310Archive support (#1872)489d13cUpdate README.mdd29ee55Reduce aws-access-token false positives (#1876)611db65Setpass_filenamestofalsefor Docker hook (#1850)0589ae0unicode decoding (#1854)82f7e32Diagnostics (#1856)f97a9eechore: include decoder in debug log (#1853)Got another @bplaxco release. Cheers!
Archive Scanning
Sometimes secrets are packaged within archive files like zip files or tarballs,
making them difficult to discover. Now you can tell gitleaks to automatically
extract and scan the contents of archives. The flag
--max-archive-depthenables this feature for both
dirandgitscan types. The default value of"0" means this feature is disabled by default.
Recursive scanning is supported since archives can also contain other archives.
The
--max-archive-depthflag sets the recursion limit. Recursion stops whenthere are no new archives to extract, so setting a very high max depth just
sets the potential to go that deep. It will only go as deep as it needs to.
The findings for secrets located within an archive will include the path to the
file inside the archive. Inner paths are separated with
!.Example finding (shortened for brevity):
This means a secret was detected on line 4 of
files/.env.prod.which is inarchives/files.tarwhich is intestdata/archives/nested.tar.gz.Currently supported formats:
The compression
and archive
formats supported by mholt's archives package
are supported.
v8.26.0Compare Source
Changelog
78eebacPercent/URL Decoding Support (#1831)6f967cafix(kubernetes): remove slow element from pat (#1848)88f56d3feat: identify slow file (#1479)9609928rm 1password detect test since we test it in cfg gen23cb69ffeat(rules): Add 1Password secret key detection (#1834)Calling this one @bplaxco's release as he introduced a really clever method for mixed decoding without sacrificing too much performance. As I stated in his PR, I think he's either a wizard or some time traveling AI. Dude is wicked smaht
Anyways, Gitleaks now supports the following decoders:
hex,percent(url enconding), andb64. It's relatively straight forward to add a new decoder so if you're motivated, community contributions are welcomed!Here's an example:
v8.25.1Compare Source
Changelog
d1c7759fix(detect): test all allowlists (#1845)Big thanks @rgmz
v8.25.0Compare Source
Changelog
4451b45feat(config): define multiple global allowlists (#1777) (cause for the minor bump change)7fb21a4feat(rules): Add Perplexity AI API key detection (#1825)f6193bcfeat(gcp): increase rule entropy (#1840)9bc7257Adding clickhouse scanner (#1826)b6cc71afix(baseline): work with --redact (#1741)cfdeb0dfeat(rule): validate & sort rule when generating (#1817)Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.