generic.secrets.gitleaks.atlassian-api-token.atlassian-api-token
semgrep
Author
unknown
Download Count*
License
A gitleaks atlassian-api-token was detected which attempts to identify hard-coded credentials. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
Run Locally
Run in CI
Defintion
rules:
- id: atlassian-api-token
message: A gitleaks atlassian-api-token was detected which attempts to identify
hard-coded credentials. It is not recommended to store credentials in
source-code, as this risks secrets being leaked and used by either an
internal or external malicious adversary. It is recommended to use
environment variables to securely provide credentials or retrieve
credentials from a secure vault or HSM (Hardware Security Module).
languages:
- regex
severity: INFO
metadata:
likelihood: LOW
impact: MEDIUM
confidence: LOW
category: security
cwe:
- "CWE-798: Use of Hard-coded Credentials"
cwe2021-top25: true
cwe2022-top25: true
owasp:
- A07:2021 - Identification and Authentication Failures
references:
- https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
source-rule-url: https://github.com/zricethezav/gitleaks/tree/master/cmd/generate/config/rules
subcategory:
- vuln
technology:
- gitleaks
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
vulnerability_class:
- Hard-coded Secrets
patterns:
- pattern-regex: (?i)(?:atlassian|confluence|jira)(?:[0-9a-z\-_\t
.]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:{1,3}=|\|\|:|<=|=>|:|\?=)(?:'|\"|\s|=|\x60){0,5}([a-z0-9]{24})(?:['|\"|\n|\r|\s|\x60|;]|$)
Examples
atlassian-api-token.go
// ruleid: atlassian-api-token
atlassian_api_token = "fmh908q7r56qstff024d9wu1"
// ruleid: atlassian-api-token
confluence_api_token = "jpfx38t5wsrq7saj2257i6dr"
Short Link: https://sg.run/ZAWw