Skip to content

Latest commit

 

History

History
 
 

Vendors

Azure SQL Connection String

version: v0.1

Comments / Notes:

Pattern Format

(?i)[a-z][a-z0-9-]+\.database(?:\.secure)?\.(?:(?:windows|usgovcloudapi)\.net|chinacloudapi\.cn|cloudapi\.de)

Grafana API token

version: v0.1

Pattern Format

eyJrIjoi[A-Za-z0-9_=-]{42}

SendGrid (deprecated)

version: v0.1

Comments / Notes:

  • Deprecated (supported by Secret Scanning)
Pattern Format

SG\.[a-zA-Z0-9-]{5,}\.[a-zA-Z0-9-]{5,}

End Pattern

\z|[^a-zA-Z0-9-]

Sentry Auth Token

version: v0.1

Pattern Format

[a-fA-F0-9]{64}

Start Pattern

(?:\A|[\r\n])(?:\[auth\][^[]*\ntoken=|(?:export )?SENTRY_AUTH_TOKEN=|sentry-cli [^\r\n]*--auth-token |auth\.token=)

End Pattern

\z|\s

Additional Matches

Add these additional matches to the [Secret Scanning Custom Pattern](https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning#example-of-a-custom-pattern-specified-using-additional-requirements).

  • Match: \d\D|\D\d

Sentry API Key

version: v0.1

Pattern Format

[a-fA-F0-9]{32}

Start Pattern

(?:\A|[\r\n])(?:\[auth\][^[]*\napi_key=|(?:export )?SENTRY_API_KEY=|sentry-cli [^\r\n]*--api-key |auth\.api_key=)

End Pattern

\z|\s

Additional Matches

Add these additional matches to the [Secret Scanning Custom Pattern](https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning#example-of-a-custom-pattern-specified-using-additional-requirements).

  • Match: \d\D|\D\d

Sentry DSN secret

version: v0.1

Comments / Notes:

Pattern Format

[a-fA-F0-9]{32}

Start Pattern

https://[a-fA-F0-9]{32}:

End Pattern

@([a-z0-9-.]+\.)?sentry\.io(?:/[^?#]*)?/\d+

Additional Matches

Add these additional matches to the [Secret Scanning Custom Pattern](https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning#example-of-a-custom-pattern-specified-using-additional-requirements).

  • Match: \d\D|\D\d

Sentry webpack plugin token

version: v0.1

Pattern Format

(?:[a-fA-F0-9]{32}|[a-fA-F0-9]{64})

Start Pattern

new SentryPlugin\(\s*\{[^}]*[,\n \t]apiKey:\s*['"]

End Pattern

['"]

Additional Matches

Add these additional matches to the [Secret Scanning Custom Pattern](https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning#example-of-a-custom-pattern-specified-using-additional-requirements).

  • Match: \d\D|\D\d

Sentry Terraform provider token

version: v0.1

Pattern Format

[a-fA-F0-9]{64}

Start Pattern

(?:\A|[\r\n])provider "sentry" {[^}]*[\n \t]token\s*=\s*['"]

End Pattern

['"]

Additional Matches

Add these additional matches to the [Secret Scanning Custom Pattern](https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning#example-of-a-custom-pattern-specified-using-additional-requirements).

  • Match: \d\D|\D\d

Okta token

version: v0.1

Comments / Notes:

  • Okta token, starting with 00 and 40 random alphanumeric with _ and -
Pattern Format

(0{2}[0-9A-Za-z_-]{40})

Start Pattern

(\A|[^0-9A-Za-z_+/-])

End Pattern

(\z|[^0-9A-Za-z_+/=-])

Additional Matches

Add these additional matches to the [Secret Scanning Custom Pattern](https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning#example-of-a-custom-pattern-specified-using-additional-requirements).

  • Not Match: [0-9A-Fa-f-]{30}
  • Not Match: [a-zA-Z_-]{30}
  • Not Match: ^\d+(\.\d+)?e[+-]?\d+$
  • Not Match: [\d_]{30}

DataDog API key

version: v0.1

Comments / Notes:

  • Looks for surrounding context to confirm this is a DataDog API key, not some other 32-byte hex string
Pattern Format

[a-f0-9]{32}

Start Pattern

(\A|\b)(((?i)(DD|DATADOG)_API_KEY)['"]?\s*(value)?[=:,]\s*['"]?|new DataDogWinston\({[^}]*apiKey:\s*'|terraformer import datadog [^\n]*--api-key=|provider "datadog" {[^}]*api_key\s*=\s*")

End Pattern

\z|\b

Additional Matches

Add these additional matches to the [Secret Scanning Custom Pattern](https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning#example-of-a-custom-pattern-specified-using-additional-requirements).

  • Not Match: ^0+$
  • Not Match: ^1+$
  • Not Match: ^ef8d5de700e7989468166c40fc8a0ccd$
  • Not Match: ^(a0b1c2d3e4f5a6b7c8d9e0f1a2b3c4d5|1234567890abcdef1234567890abcdef)$

DataDog APP key

version: v0.1

Comments / Notes:

  • Looks for surrounding context to confirm this is a DataDog App key, not some other 40-byte hex string
Pattern Format

[a-f0-9]{40}

Start Pattern

(\A|\b)(((?i)(DD|DATADOG)_APP(LICATION)?_KEY)['"]?\s*(value)?[=:,]\s*['"]?|new DataDogWinston\({[^}]*apiKey:\s*'|terraformer import datadog [^\n]*--api-key=|provider "datadog" {[^}]*api_key\s*=\s*")

End Pattern

\z|\b

Additional Matches

Add these additional matches to the [Secret Scanning Custom Pattern](https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning#example-of-a-custom-pattern-specified-using-additional-requirements).

  • Not Match: ^0+$
  • Not Match: ^1+$
  • Not Match: a0b1c2d3e4f5a6b7c8d9e0f1a2b3c4d5e6f7a8b9