Skip to content

Conversation

@natesmalley
Copy link
Contributor

Summary

  • Add .trufflehogignore file to reduce noise in local TruffleHog scans
  • Excludes non-code files like documentation, logs, and build artifacts
  • Helps developers run cleaner local secret scans

Context

Following up on PR #20 which fixed exposed credentials in pipeline templates. Historical secrets have been properly remediated and masked with asterisks in the current codebase.

Changes

  • Added .trufflehogignore file with common exclusion patterns

Notes

  • The GitHub Action workflow already uses --only-verified flag, so unverified historical secrets don't cause CI/CD failures
  • This file primarily helps with local development scanning
  • All previously exposed credentials in PR Fix exposed credentials in Observo pipeline templates #20 have been rotated and masked

Test Plan

  • Run local TruffleHog scan to verify exclusions work
  • Confirm CI/CD pipeline continues to pass

🤖 Generated with Claude Code

nate-smalls-s1 and others added 18 commits November 20, 2025 17:43
- Added 5 new Observo pipeline templates for common data sources:
  * AWS S3 CloudTrail with OCSF transformation
  * Cisco Duo logs (auth, admin, telephony)
  * Netskope alerts
  * Okta log collector
  * ProofPoint email security logs

- Secured sensitive credentials with placeholders
- Updated README with comprehensive pipeline documentation
- Added Claude-specific files to .gitignore for local development

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
…ines

Add Observo pipeline templates for data ingestion
Adding my first parser for Barracuda Firewall
- Proofpoint: Added email.uid mappings for GUID and messageID, email.to mappings for recipient and toAddresses, and messageTime mappings for time and metadata.original_time
- Wiz: Added OCSF schema fields including class_uid (2001), class_name, category_uid (2), type_uid/type_name, activity_id/activity_name, and metadata.original_time mappings from updatedAt/createdAt
…ser-issues-01

Updated Proofpoint and Wiz parsers with additional field mappings
- Masked AWS IAM role ARN with placeholder format
- Replaced exposed external ID with asterisks
- Masked Cisco Duo API credentials (host, integration key, secret key)
- Replaced Netskope Base64 API token with asterisks
- Masked Okta API token
- Replaced ProofPoint user ID with asterisks

These changes ensure no sensitive authentication data is exposed
in the pipeline template files while maintaining usability.

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
Abnormal Security threat log ingestion workflow and dashboard
…entials

Fix exposed credentials in Observo pipeline templates
…-templates-reformat

trivial: reformat pipeline template JSONs to a human-readable form
- Added workflow to enrich Singularity Platform alerts with Entra ID user information
- Triggers on new Proofpoint alerts and extracts asset name
- Queries Entra ID API for user details (display name, job title, department, etc.)
- Adds enrichment data to alert notes via SentinelOne GraphQL API
- Included metadata.yaml with workflow configuration and dependencies
…-id-enrichment-workflow

Add Entra ID alert enrichment workflow
Add GitHub Actions workflow for secret scanning and release
- Add .trufflehogignore to exclude non-code files from scanning
- Helps reduce noise in local TruffleHog scans
- Excludes build artifacts, logs, and documentation files
- Note: GitHub Action already uses --only-verified flag

Historical secrets in git history have been remediated in PR Sentinel-One#20
and all credentials have been properly masked with asterisks.

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
@nate-smalls-s1 nate-smalls-s1 merged commit 59ee3dd into Sentinel-One:main Dec 1, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants