-
Notifications
You must be signed in to change notification settings - Fork 179
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
⚡️ Add sensitive data types for Database URL patterns #90
Comments
can you assign this to me? |
Assigned! Happy hackfesting 🎉 |
Hi @SandeepSrinivasan thanks for your submission in Hackfest. 🔥 We are reviewing your work. Do these two below: Join this group on discord for discussions around prizes? 🚀 🏆 |
@Ankita28g I would like to have a go at this one? |
I've assigned it to you, @syedzubeen. Happy hacking! Feel free to join our Discord if you need assistance. |
@avneesh-akto / @Ankita28g |
Hi @syedzubeen. Please escape strings in regex |
@avneesh-akto fixed. |
I can still see unescaped regex |
💭 Introduction
Akto allows users to find sensitive params in request and response of APIs. These sensitive params include PII data such as SSN, Credit card number, phone number etc. You can check how it works in the docs.
Your task is to add sensitive params related to
Database URL patterns
.👀 Impact:
Your task will give users the ability to detect sensitive data types related to database url patterns.
🎯 Requirements:
✅ Task summary
SQL
,Mongo
,S3
,RDS
,Prometheus
,Redis
)✌🏻 Hints
Example for Redis :
redis(s|-sentinel|-socket)?:\/\/(.*):(\d*)
🙋🏼♂️ Questions
If you have questions, need any help, or just want to hang out, make sure to join us on our Discord server.
The text was updated successfully, but these errors were encountered: