Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Detector] Cut out unneccessary false positive session tokens of AWSSession Key #3306

Merged

Conversation

abmussani
Copy link
Contributor

Description:

Based on the article, Session Key can be of 5 variants and can be easily identified based on sub-strings (YXdz & Jb3JpZ2luX2Vj). Current implementation was only looking for YXdz. This PR includes check for another string Jb3JpZ2luX2Vj.

Checklist:

  • Tests passing (make test-community)?
  • Lint passing (make lint this requires golangci-lint)?

For AWS session token, substring is being searched to avoid false positive session tokens.
Reference: https://nitter.poast.org/TalBeerySec/status/1816449053841838223#m
@dustin-decker dustin-decker merged commit b612e1e into trufflesecurity:main Sep 24, 2024
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants