-
-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add sendgrid key detection #128
Conversation
Fmm. Can you run It is implicitly dependencies.
Would we change this rule to more specific rule like We want to reduce false-positive. It is one of Secretlint's Philosophy. I think that current implementation has a false-positive. For example enctrypted key like SealedSecrets
I found similar problem in git-secrets https://github.com/awslabs/git-secrets/blob/5e28df337746db4f070c84f7069d365bfd0d72a8/git-secrets#L239 and I've changed this logic in secretlint-rule-aws secretlint/packages/@secretlint/secretlint-rule-aws/src/index.ts Lines 102 to 106 in c09ba64
While, Detecting It is similar with slack api key. secretlint/packages/@secretlint/secretlint-rule-slack/src/index.ts Lines 41 to 47 in c09ba64
|
I did that and it seems to be all good now.
Oh I see. You are right, I'll update this to do @secretlint/secret-rule-sendgrid instead 👍 |
Co-Authored-By: azu <azu@users.noreply.github.com>
Co-Authored-By: azu <azu@users.noreply.github.com>
I'll publish this pacakge in next update(today ~ tommorow). Thanks for improving! |
This rule allows detecting more generic api keys like the ones used by SendGrid.
I cannot run the tests locally or compile the project to continue development due to a typescript error which seems to be present for all packages:
Do you have any tips on how I can fix this?