zricethezav / gitleaks
- среда, 21 февраля 2018 г. в 03:16:11
Searches full repo history for secrets and keys 🔑
go get -u github.com/zricethezav/gitleaks
./gitleaks {git url}
This example will clone the target {git url}
and run a diff on all commits. A report will be output to {repo_name}_leaks.json
Gitleaks scans all lines of all commits and checks if there are any regular expression matches. The regexs are defined in main.go
. For example if a line in a commit diff like AWS_KEY='AKAI...'
exists then the value after the assignment operator will be checked for entropy. If the value is above a certain entropy threshold then we assume that the line contains a key/secret. Work largely based on https://people.eecs.berkeley.edu/~rohanpadhye/files/key_leaks-msr15.pdf and https://github.com/dxa4481/truffleHog.
./gitleaks -u {user git url}
./gitleaks -o {org git url}
usage: gitleaks [options] [git url]
Options:
-c Concurrency factor (potential number of git files open)
-u Git user url
-r Git repo url
-o Git organization url
-s Strict mode uses stopwords in checks.go
-e Base64 entropy cutoff, default is 70
-x Hex entropy cutoff, default is 40
-h --help Display this message
NOTE: your mileage may vary so if you aren't getting the results you expected try tweaking the entropy cutoffs and stopwords. Entropy cutoff for base64 alphabets seemed to give good results around 70 and hex alphabets seemed to give good results around 40. Entropy is calculated using http://www.bearcave.com/misl/misl_tech/wavelets/compression/shannon.html
Please read https://help.github.com/articles/removing-sensitive-data-from-a-repository/ to remove the sensitive information from your history