Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secret Detected in README #195

Closed
RexBelli opened this issue Sep 15, 2021 · 9 comments · Fixed by #196
Closed

Secret Detected in README #195

RexBelli opened this issue Sep 15, 2021 · 9 comments · Fixed by #196
Projects

Comments

@RexBelli
Copy link
Contributor

Hello 👋
In the README on this repo, there is a string that Github Secret Scanning detects as a secret:

createTokenAuth("v1.d3d433526f780fbcc3129004e2731b3904ad0b86");

I expect this secret is either no longer valid or entirely fake, and so isn't a security concern. However, it does create an alert whenever someone vendors a version of this repo into their codebase.

image

Can this be modified so as to not trigger Github Secret Scanning somehow? I would propose a PR, but I'm not sure of the exact regex being used to detect Github App Installation Access Tokens.

Thank you!

@gr2m
Copy link
Contributor

gr2m commented Sep 15, 2021

can you change it to v1.1234567890abcdef1234567890abcdef12345678? The secret scanning will run on the pull request so we should find out if it triggers or not

@RexBelli
Copy link
Contributor Author

Sure thing: #196

@gr2m gr2m closed this as completed in #196 Sep 15, 2021
JS automation moved this from Maintenance to Done Sep 15, 2021
@RexBelli
Copy link
Contributor Author

@gr2m It seems it's still detected by Github Secret Scanning:
Screen Shot 2021-09-15 at 11 45 44 AM

@gr2m gr2m reopened this Sep 15, 2021
@ghost ghost moved this from Done to Maintenance in JS Sep 15, 2021
@gr2m
Copy link
Contributor

gr2m commented Sep 15, 2021

Okay, lets replace all the 1234567890abcdef1234567890abcdef12345678 strings with secret. Would you like to send another PR for that?

@RexBelli
Copy link
Contributor Author

Sure, if that's what you want. If you prefer to keep a real looking secret in the examples, there may be one that doesn't trigger secret scanning. If you have a contact on the Github Advanced Security team, they may be able to provide some insight.

@gr2m
Copy link
Contributor

gr2m commented Sep 15, 2021

yes I'll do that, too :) But all the shown tokens have a different format now, so I'll have to update them anyway. I'd iterate on it, lets unblock you first, then I'll update it again once GitHub gets back to me

@RexBelli
Copy link
Contributor Author

RexBelli commented Sep 15, 2021

Ah, nice! In that case, I'm fine holding off. This isn't a pressing issue on our side.

@gr2m
Copy link
Contributor

gr2m commented Sep 15, 2021

closing in favor of #197 then

@gr2m gr2m closed this as completed Sep 15, 2021
JS automation moved this from Maintenance to Done Sep 15, 2021
@15MariamS
Copy link

15MariamS commented Sep 16, 2021

The new format of GitHub tokens uses a 32-bit checksum in the last 6 digits of each token; this means that when we scan for GitHub tokens, we can check that the token input matches the checksum and eliminate fake tokens.

In this case, you can use the checksum to generate an example token that we do not alert on.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
No open projects
JS
  
Done
Development

Successfully merging a pull request may close this issue.

3 participants