Policies for secret detection
Endor Labs comes with the following out-of-the-box finding policies to detect leaked secrets. See Finding Policies for details on how to enable, disable, or edit out-of-the-box policies.
Note: The out-of-the-box secret policies can be deleted and re-created from the corresponding policy templates. See Policy templates for secret detection below.
Policy | Description | Severity |
---|---|---|
Valid Secrets | Scan the code for active secrets. When a secret is valid, it means that the secret meets the necessary criteria or requirements to be considered acceptable or legitimate within a given context. For example GitHub personal access tokens of an employee that are not yet expired and can be used to access an organization’s codebase. | Critical |
Invalid Secrets | Scan the code for any secrets that are no longer valid. | Low |
Secrets without validation rules | Detect secrets that cannot be validated either because there is no validator or the validation failed for any reason. | Medium |
Policy templates for secret detection
Endor Labs provides the following finding policy templates for detecting secrets. See Finding Policies for details on how to create policies from policy templates.
Policy Template | Description | Severity |
---|---|---|
Valid Secrets | Use this template to scan the code for active secrets. When a secret is valid, it means that the secret meets the necessary criteria or requirements to be considered acceptable or legitimate within a given context. For example GitHub personal access tokens of an employee that are not yet expired and can be used to access an organization’s codebase. | Critical |
Invalid Secrets | Use this template to scan the code for any secrets that are no longer valid. | Low |
Secrets without validation rules | Use this template to detect secrets that cannot be validated either because there is no validator or the validation failed for any reason. | Medium |
Define custom secret token policy rules | Use this template to detect secrets in the code using a custom secret rule to detect secret of any service that may not be included in the other rules. | Critical |