Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade to v3.88.4 #66

Merged
merged 23 commits into from
Feb 2, 2025
Merged

Upgrade to v3.88.4 #66

merged 23 commits into from
Feb 2, 2025

Conversation

rgmz
Copy link
Owner

@rgmz rgmz commented Feb 2, 2025

Description:

Update changes from:

Checklist:

  • Tests passing (make test-community)?
  • Lint passing (make lint this requires golangci-lint)?

mcastorina and others added 22 commits January 9, 2025 14:08
* update log for large s3 file

* key and size already in ctx
* pass on host to gitlab analyzer from detector

* remove version from metadata as that causes the test to fail

* reverted the cli to old one.
code refactoring
* issue:3838 - fixed common email pattern

* updated pattern as suggested by rgmz

Co-authored-by: Richard Gomez <[email protected]>

---------

Co-authored-by: Richard Gomez <[email protected]>
The URI detector currently makes an indiscriminate number of HTTP requests to domains, regardless of whether they actually exist. This results in wasted network bandwidth and logs spammed with things like below:

Found unverified result 🐷🔑❓
Verification issue: lookup proxy.example.com: no such host
Detector Type: URI
Decoder Type: PLAIN
Raw result: http://username:[email protected]
Commit: 0dec3cdfe8cbd1c7fd6b5bdd3d8f108d4cc42311
Email: Toan <[email protected]>
File: reactjs.zip
Line: 127
Link: https://github.com/azureossd/Deployment-Oryx-Samples/blob/0dec3cdfe8cbd1c7fd6b5bdd3d8f108d4cc42311/reactjs.zip#L127
Repository: https://github.com/azureossd/Deployment-Oryx-Samples.git
Timestamp: 2020-04-23 01:20:33 +0000

In addition to de-duplicating matches, this updates the URI detector to track hosts that are not found and skip verification.
* fixed sentry auth token detector

* not sure why this is failing

* Updated http client logic

Co-authored-by: Richard Gomez <[email protected]>

* resolved comments

* improved decoding logic

* removed response type

* splitted to two versions

* splitted to two versions

* this is confusing error

---------

Co-authored-by: Richard Gomez <[email protected]>
This PR updates an error message to be more helpful.
…esecurity#3847)

* exposed a MethodIsSafe() to reuse it in OpsGenie Analyzer.
Use Restricted Client for non-safe APIs.

* Renamed MethodIsSafe to IsMethodSafe for more clarity
* Updated Postman metadata fields to contain location uniqueness and took out the unused fields of global_id, field_name, and variable_type.
* Disabled body scanning for now since the only body that is scanned is the currently selected radio button but secrets can still be saved in the other unselected radio button options.
* Updated link generation for more accuracy.
* Updated tests to not use global constant.
… detectors (trufflesecurity#3860)

* Simple implementation of exclude regexes, stopwords, and entropy checks for customdetectors

* better name

* readme blurb and example

* link
@rgmz rgmz changed the title Upgrade to v3.884 Upgrade to v3.88.4 Feb 2, 2025
@rgmz rgmz marked this pull request as ready for review February 2, 2025 16:51
@rgmz rgmz merged commit 69011c9 into main Feb 2, 2025
10 checks passed
@rgmz rgmz deleted the build/v3.88.4 branch February 2, 2025 17:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

10 participants