Gitleaks
Gitleaks is a powerful open-source tool that helps you find and eliminate sensitive information leaks in your Git repositories.
Auditor Job Name: GitLab Gitleaks Auditor image: registry.gitlab.com/whitespots-public/security-images/secret-detection-gitlab:5 AppSec Portal Importer Name: GitLab Gitleaks
Auditor Job Name: Gitleaks Scan Auditor image: registry.gitlab.com/whitespots-public/security-images/gitleaks:8.15.3 AppSec Portal Importer Name: Gitleaks Scan
Gitleaks uses regular expressions to search for specific patterns of sensitive information. By default, it comes with a list of regular expressions that cover common secrets, but it can also be customized to match specific patterns.
One of the unique features of Gitleaks is its ability to scan not only the repository itself but also its entire commit history, making it a powerful tool for detecting information leaks that may have been committed in the past.
Curl example
In this command, the following parameters are used:
-X POST
: specifies the HTTP method to be used (in this case, POST)-H "Authorization: Token <authorization_token>"
: specifies the authorization token obtained from AppSec Portal.-H "Content-Type: multipart/form-data"
: specifies the content type of the request.-F "file=@<report_file_path>"
: specifies the path to the report file generated by the scanner.-F "product_name=<product_name>"
: specifies the name of the product being scanned.-F "product_type=<product_type>"
: specifies the type of the product being scanned.-F "scanner_name=<scanner_name>"
: specifies the name of the scanner used to generate the report (GitLab Gitleaks or Gitleaks Scan)-F "branch=<branch_name>"
: (optional) specifies the name of the branch in the source code repository (if applicable) This parameter is particularly useful when you want to associate the scan results with a specific branch in your repository. If not provided, the scan will be associated with the default branch
Asset information, if an auditor is used
-F "repository=<repository SSH URL>"
: If your product is code in a repository enter the address of your repository in a specific format, for example: git@gitlab.com:whitespots-public/appsec-portal.git-F "docker_image=<registry address>"
: If your product is image enter the address of the registry where your product is located, for example: registry.gitlab.com/whitespots-public/appsec-portal/back/auto_validator:latest-F "domain=<domain>"
: If your product is web enter the domain name of your product, for example: whitespots.io-F "host=<host>"
: If your product is web enter the IP address of your product, for example: 0.0.0.0
Report example:
Last updated