-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
make DetectSecrets detectors configurable #6522
Comments
Hey! @kagahd Thanks for your feature request! I'll discuss this with the team and I'll be back with a solution. |
Hi @pedrooot thanks for the quick implementation! Looks good to me! 👍 |
Btw. I opened a PR on Yelp/DetectSecrets to add a new detector for Aiven tokens. However, I doubt that it will be merged soon considering all the open, unmerged other PR's for new detectors. |
Hello @kagahd we are trying to push the We are exploring several options since we can't be blocked by having a dependency without an active maintenance. |
New feature motivation
Instead to have all the detectors hard coded in utils.py, they could/should be in config.yaml. This would make it easier to deactivate detectors aka plugins.
Solution Proposed
For example, the
KeywordDetector
finds a lot of false-positives because even if the keyword is suspicious (e.g.DB_PASSWORD
) the value may be harmless (e.g. the ARN to the secret in AWS secrets manager). Even worse, the user could only mitigate the "potential risk" by renaming the keyword, not its value, to make the check pass.However, I wouldn't wipe the
KeywordDetector
one for all because it can be used for manual audits. Thus, making the used detectors configurable would be a good solution.Describe alternatives you've considered
None so far
Additional context
No response
The text was updated successfully, but these errors were encountered: