- Add copyright headers to all validation scripts - Add usage/help functions to user-facing scripts - Enhance common.sh with dependency checking and timestamps - Add ENTERPRISE.md with comprehensive standards documentation - Update scripts/README.md with enterprise features section - Improve error messages and exit code handling Co-authored-by: jmiller-moko <230051081+jmiller-moko@users.noreply.github.com>
87 lines
2.6 KiB
Bash
Executable File
87 lines
2.6 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
|
|
# ============================================================================
|
|
# Copyright (C) 2025 Moko Consulting <hello@mokoconsulting.tech>
|
|
#
|
|
# This file is part of a Moko Consulting project.
|
|
#
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program (./LICENSE.md).
|
|
# ============================================================================
|
|
|
|
# ============================================================================
|
|
# FILE INFORMATION
|
|
# ============================================================================
|
|
# DEFGROUP: Script.Validate
|
|
# INGROUP: Security
|
|
# REPO: https://github.com/mokoconsulting-tech/moko-cassiopeia
|
|
# PATH: /scripts/validate/no_secrets.sh
|
|
# VERSION: 01.00.00
|
|
# BRIEF: Scan for accidentally committed secrets and credentials
|
|
# NOTE: High-signal pattern detection to prevent credential exposure
|
|
# ============================================================================
|
|
|
|
set -euo pipefail
|
|
|
|
SRC_DIR="${SRC_DIR:-src}"
|
|
|
|
json_escape() {
|
|
python3 -c 'import json,sys; print(json.dumps(sys.argv[1]))' "$1"
|
|
}
|
|
|
|
[ -d "${SRC_DIR}" ] || {
|
|
printf '{"status":"fail","error":%s}
|
|
' "$(json_escape "src directory missing")"
|
|
exit 1
|
|
}
|
|
|
|
# High-signal patterns only. Any match is a hard fail.
|
|
patterns=(
|
|
'-----BEGIN (RSA|DSA|EC|OPENSSH) PRIVATE KEY-----'
|
|
'PuTTY-User-Key-File-'
|
|
'AKIA[0-9A-Z]{16}'
|
|
'ASIA[0-9A-Z]{16}'
|
|
'ghp_[A-Za-z0-9]{36}'
|
|
'gho_[A-Za-z0-9]{36}'
|
|
'github_pat_[A-Za-z0-9_]{20,}'
|
|
'xox[baprs]-[0-9A-Za-z-]{10,48}'
|
|
'sk_live_[0-9a-zA-Z]{20,}'
|
|
)
|
|
|
|
regex="$(IFS='|'; echo "${patterns[*]}")"
|
|
|
|
set +e
|
|
hits=$(grep -RInE --exclude-dir=vendor --exclude-dir=node_modules --exclude-dir=dist "${regex}" "${SRC_DIR}" 2>/dev/null)
|
|
set -e
|
|
|
|
if [ -n "${hits}" ]; then
|
|
{
|
|
echo '{"status":"fail","error":"secret_pattern_detected","hits":['
|
|
echo "${hits}" | head -n 50 | python3 - <<'PY'
|
|
import json,sys
|
|
lines=[l.rstrip('
|
|
') for l in sys.stdin.readlines() if l.strip()]
|
|
print("
|
|
".join([json.dumps({"hit":l})+"," for l in lines]).rstrip(','))
|
|
PY
|
|
echo ']}'
|
|
}
|
|
exit 1
|
|
fi
|
|
|
|
printf '{"status":"ok","src_dir":%s}
|
|
' "$(json_escape "${SRC_DIR}")"
|
|
echo "no_secrets: ok"
|