generic.secrets.security.detected-google-oauth-access-token.detected-google-oauth-access-token
Community Favorite

Author
37,965
Download Count*
License
Google OAuth Access Token detected
Run Locally
Run in CI
Defintion
rules:
- id: detected-google-oauth-access-token
pattern-regex: ya29\.[0-9A-Za-z\-_]+
languages:
- regex
message: Google OAuth Access Token detected
severity: ERROR
metadata:
cwe:
- "CWE-798: Use of Hard-coded Credentials"
source-rule-url: https://github.com/dxa4481/truffleHogRegexes/blob/master/truffleHogRegexes/regexes.json
category: security
technology:
- secrets
- google
confidence: LOW
owasp:
- A07:2021 - Identification and Authentication Failures
references:
- https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures
cwe2022-top25: true
cwe2021-top25: true
subcategory:
- audit
likelihood: LOW
impact: MEDIUM
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
Examples
detected-google-oauth-access-token.txt
oauth2 request:{
// ruleid: detected-google-oauth-access-token
"access_token" : "ya29.AHES67zeEn-RDg9CA5gGKMLKuG4uVB7W4O4WjNr-NBfY6Dtad4vbIZ",
"token_type" : "Bearer",
"expires_in" : 3600
}
Short Link: https://sg.run/ox2n