We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When testing these new plugins, I noticed this plugin was capturing more than what I'd expect it to capture.
$ cat aws_credentials.json { "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "secretAccessKey": "81442db33ceee1092586feb635d7b3c5d72257c775ee323414bac8e673d41af3" } $ detect-secrets scan aws_credentials.json > baseline $ detect-secrets audit baseline
It looks like the regex is capturing 81442db33ceee1092586feb635d7b3c5d72257c775ee3234, rather than the full string.
81442db33ceee1092586feb635d7b3c5d72257c775ee3234
@killuazhu : Does this password regex need to be $ terminated?
$
The text was updated successfully, but these errors were encountered:
@domanchi That would be a good idea. Would put up a fix for this.
Sorry, something went wrong.
small readme typo (Yelp#288)
4fb1153
af140a1
Successfully merging a pull request may close this issue.
When testing these new plugins, I noticed this plugin was capturing more than what I'd expect it to capture.
Reproduction Steps
It looks like the regex is capturing
81442db33ceee1092586feb635d7b3c5d72257c775ee3234
, rather than the full string.Proposed Fix
@killuazhu : Does this password regex need to be
$
terminated?The text was updated successfully, but these errors were encountered: