Skip to content

Latest commit

 

History

History
139 lines (98 loc) · 6.5 KB

Adding_Detectors_external.md

File metadata and controls

139 lines (98 loc) · 6.5 KB

Secret Detectors

Secret Detectors have these two major functions:

  1. Given some bytes, extract possible secrets, typically using a regex.
  2. Validate the secrets against the target API, typically using a HTTP client.

The purpose of Secret Detectors is to discover secrets with exceptionally high signal. High rates of false positives are not accepted.

Table of Contents

Getting Started

Sourcing Guidelines

We are interested in detectors for services that meet at least one of these criteria

  • host data (they store any sort of data provided)
  • have paid services (having a free or trial tier is okay though)

If you think that something should be included outside of these guidelines, please let us know.

Development Guidelines

  • When reasonable, favor using the net/http library to make requests instead of bringing in another library.
  • Use the common.SaneHttpClient for the http.Client whenever possible.

Development Dependencies

  • Go 1.17+
  • Make

Adding New Token Formats to an Existing Scanner

In some instances, services will update their token format, requiring a new regex to properly detect secrets in addition to supporting the previous token format. Accomodating this can be done without adding a net-new detector. We provide a Versioner interface that can be implemented.

  1. Create a copy of the package and append _v2 to the package and file names. Ex: <packagename>/ -> <packagename>_v2, <packagename>.go -> <packagename>_v2.go

Note: Be sure to update the tests to reference the new secret values in GSM, or the tests will fail.

  1. Implement the Versioner interface. GitHub example implementation.

  2. Proceed from step 3 of Creating a new Secret Scanner

Creating a new Secret Scanner

  1. Identify the Secret Detector name from the /proto/detectors.proto DetectorType enum. If necessary, run make protos when adding new ones.

  2. Generate the Secret Detector

    go run hack/generate/generate.go detector <DetectorType enum name>
  3. Add Secret Scanner

    Add the secret scanner to the pkg/engine/defaults.go file like github.com/trufflesecurity/trufflehog/v3/pkg/detectors/<detector_name> and <detector_name>.Scanner{},

  4. Complete the secret detector.

    The previous step templated a boilerplate + some example code as a package in the pkg/detectors folder for you to work on. The secret detector can be completed with these general steps:

    1. Create a test secrets file, and export the variable
    2. Update the pattern regex and keywords. Try iterating with regex101.com.
    3. Update the verifier code to use a non-destructive API call that can determine whether the secret is valid or not.
    4. Update the tests with these test cases at minimum:
      1. Found and verified (using a credential loaded from GCP Secrets)
      2. Found and unverified (determinately, i.e. the secret is invalid)
      3. Found and unverified (indeterminately due to timeout)
      4. Found and unverified (indeterminately due to an unexpected API response)
      5. Not found
      6. Any false positive cases that you come across
    5. Create a pull request for review.

Addendum

Verification indeterminacy

There are two types of reasons that secret verification can fail:

  • The candidate secret is not actually a valid secret.
  • Something went wrong in the process unrelated to the candidate secret, such as a transient network error or an unexpected API response.

In Trufflehog parlance, the first type of verification response is called determinate and the second type is called indeterminate. Verification code should distinguish between the two by returning an error object in the result struct only for indeterminate failures. In general, a verifier should return an error (indicating an indeterminate failure) in all cases that haven't been explicitly identified as determinate failure states.

For example, consider a hypothetical authentication endpoint that returns 200 OK for valid credentials and 403 Forbidden for invalid credentials. The verifier for this endpoint could make an HTTP request and use the response status code to decide what to return:

  • A 200 response would indicate that verification succeeded. (Or maybe any 2xx response.)
  • A 403 response would indicate that verification failed determinately and no error object should be returned.
  • Any other response would indicate that verification failed indeterminately and an error object should be returned.

Using a test secret file

  1. Create a file called .env with this env file format:

    SECRET_TYPE_ONE=value
    SECRET_TYPE_ONE_INACTIVE=v@lue
  2. Export the TEST_SECRET_FILE variable, pointing to the env file:

    export TEST_SECRET_FILE=".env"

Now, the detector test should attempt to load the given env key from that file.

Adding Protos in Windows

  1. Install Ubuntu App in Microsoft Store https://www.microsoft.com/en-us/p/ubuntu/9nblggh4msv6.
  2. Install Docker Desktop https://www.docker.com/products/docker-desktop. Enable WSL integration to Ubuntu. In Docker app, go to Settings->Resources->WSL INTEGRATION->enable Ubuntu.
  3. Open Ubuntu cli and install dos2unix.
    sudo apt install dos2unix
  4. Identify the trufflehog local directory and convert scripts/gen_proto.sh file in Unix format.
    dos2unix ./scripts/gen_proto.sh
  5. Open /proto/detectors.proto file and add new detectors then save it. Make sure Docker is running and run this in Ubuntu command line.
    make protos

Testing a detector

   go test ./pkg/detectors/<detector> -tags=detectors