Comments (5)
Hi @jamesbraza 👋🏼 thanks for opening this issue! How would you envision this allowlist?
from detect-secrets.
Thanks for asking! To be more concise, the idea of the allowlist is going from many # pragma: allowlist secret
comments in my code base to just 1 entry in an allowlist file.
I think a YAML or TOML config file is fine, where allowed secrets show up in a YAML list. Open to anything really, and ideally it plays nicely with detect-secrets scan --baseline .secrets.baseline
from detect-secrets.
@jamesbraza I think the existing --exclude-secrets
option is what you're looking for. There's a corresponding setting you can put in your baseline file.
from detect-secrets.
You are correct! It ends up in the baseline looking like this:
{
"path": "detect_secrets.filters.regex.should_exclude_secret",
"pattern": [
"abc123",
"def456",
"test_value"
]
}
That being said, I ended up going with the word_list
extra and invoking like so:
detect-secrets scan --word-list=.secrets.allowlist
Going to close this out, thank you both!
from detect-secrets.
No worries, glad we could help out! @gpflaum thanks for helping out :)
from detect-secrets.
Related Issues (20)
- Detection of telegram bot API-keys
- Fix README so copy/paste works HOT 1
- Supported languages? HOT 3
- Secret followed by type hint are not detected
- Secrets are not found in Jupyter Notebooks HOT 1
- validity checking of detected secrets ? HOT 5
- Detect a npmrc auth token being checked in HOT 1
- Problem with Python3.11 and pre-commit HOT 4
- False Negative - YAML Parser Stops Reading After First String Value/Does Not Read Lists of Strings
- Getting detect-secrets: command not found error HOT 3
- Pre-commit hook fails with "error: Unable to read baseline." HOT 1
- Reddit HOT 1
- Request: Push a new tag HOT 3
- Bug file with just `APEOptState` seems to be breaking `detect-secrets[word_list]==1.5.0` HOT 1
- detect-secrets-hook read file list from a file, to allow use of exit code HOT 2
- KeywordDetector plugin doesn't detect secrets which start with a symbol
- Configure to only warn, for pre-commit hook config HOT 5
- Bypass any plugin with square brackets HOT 2
- detect-secrets not identifying all Github token occurrences in a file
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from detect-secrets.