Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added Onfido API token detection to recognize this type of secrets #3463

Merged
merged 1 commit into from
Sep 3, 2024

Conversation

lucasan1
Copy link
Contributor

@lucasan1 lucasan1 commented Sep 2, 2024

Add Onfido API Token detector to recognize this type of secrets. Documentation on API token can be found here: https://documentation.onfido.com/api/latest/#api-tokens.

Note that Onfido is a GitHub secret scanning partner and those tokens are currently detected by the built-in GitHub scanner.

@CLAassistant
Copy link

CLAassistant commented Sep 2, 2024

CLA assistant check
All committers have signed the CLA.

@0xDC0DE 0xDC0DE merged commit c2c65f6 into semgrep:develop Sep 3, 2024
8 checks passed
@0xDC0DE
Copy link
Contributor

0xDC0DE commented Sep 3, 2024

Thanks for your contribution!

@lucasan1 lucasan1 deleted the add-onfido-secrets branch September 3, 2024 08:46
0xDC0DE added a commit that referenced this pull request Sep 5, 2024
* Added Onfido API token detection to recognize this type of secrets (#3463)

* PHP tainted-callable (#3464)

A callable is the name of a function, or an array with a class/object and a method. Basing these on user input makes it possible to call arbitrary functions.

Co-authored-by: Pieter De Cremer (Semgrep) <pieter@r2c.dev>

---------

Co-authored-by: lucasan1 <70696858+lucasan1@users.noreply.github.com>
Co-authored-by: Sjoerd Langkemper <sjoerd-github@linuxonly.nl>
Co-authored-by: Pieter De Cremer (Semgrep) <pieter@r2c.dev>
0xDC0DE added a commit that referenced this pull request Sep 6, 2024
* Added Onfido API token detection to recognize this type of secrets (#3463)

* PHP tainted-callable (#3464)

A callable is the name of a function, or an array with a class/object and a method. Basing these on user input makes it possible to call arbitrary functions.

Co-authored-by: Pieter De Cremer (Semgrep) <pieter@r2c.dev>

* chore: put ruleid annotation alone on its own line for tainted-sql-string.py (#3467)

This is the only file doing that, so let's be consistent.
It also helps osemgrep test which does not handle this case.

This was mentioned in
https://linear.app/semgrep/issue/SAF-1529/same-line-annotations-fail-when-running-semgrep-test-but-work-with

test plan:
make test

---------

Co-authored-by: lucasan1 <70696858+lucasan1@users.noreply.github.com>
Co-authored-by: Sjoerd Langkemper <sjoerd-github@linuxonly.nl>
Co-authored-by: Pieter De Cremer (Semgrep) <pieter@r2c.dev>
Co-authored-by: Yoann Padioleau <pad@r2c.dev>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

3 participants