find-known-secrets


Namefind-known-secrets JSON
Version 1.3.0 PyPI version JSON
download
home_pagehttps://github.com/matthewdeanmartin/find_known_secrets
SummaryLossy python to markdown serializer
upload_time2023-05-29 13:51:02
maintainer
docs_urlNone
authorMatthew Martin
requires_python
licenseMIT
keywords secrets
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # find_known_secrets
Scan for known secrets in your source code before you check in

badges
------

![Libraries.io dependency status for latest release](https://img.shields.io/librariesio/release/pypi/find-known-secrets) [![Downloads](https://pepy.tech/badge/find_known_secrets/month)](https://pepy.tech/project/find-known-secrets/month)

Three Ways to Detect Secrets
----------
Pattern detection - use grep to find words like "password". git-secrets does this as well as pylint.

High entropy detection - detect-secrets does this.

Search for known secrets - Some secrets are found in conventional locations, such as AWS keys. They are typically key value pairs. As far as I known, this is a novel approach as of July 2018. So I wrote one.

All three approaches have different failure profiles.


            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/matthewdeanmartin/find_known_secrets",
    "name": "find-known-secrets",
    "maintainer": "",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "",
    "keywords": "secrets",
    "author": "Matthew Martin",
    "author_email": "matthewdeanmartin@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/28/82/e9625c52833b517c5da864d173e0b8bee4241e828b0a3fa2a107db036b99/find_known_secrets-1.3.0.tar.gz",
    "platform": null,
    "description": "# find_known_secrets\nScan for known secrets in your source code before you check in\n\nbadges\n------\n\n![Libraries.io dependency status for latest release](https://img.shields.io/librariesio/release/pypi/find-known-secrets) [![Downloads](https://pepy.tech/badge/find_known_secrets/month)](https://pepy.tech/project/find-known-secrets/month)\n\nThree Ways to Detect Secrets\n----------\nPattern detection - use grep to find words like \"password\". git-secrets does this as well as pylint.\n\nHigh entropy detection - detect-secrets does this.\n\nSearch for known secrets - Some secrets are found in conventional locations, such as AWS keys. They are typically key value pairs. As far as I known, this is a novel approach as of July 2018. So I wrote one.\n\nAll three approaches have different failure profiles.\n\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Lossy python to markdown serializer",
    "version": "1.3.0",
    "project_urls": {
        "Bug Tracker": "https://github.com/matthewdeanmartin/find_known_secrets/issues",
        "Change Log": "https://github.com/matthewdeanmartin/find_known_secrets/blob/main/CHANGES.md",
        "Documentation": "https://github.com/matthewdeanmartin/find_known_secrets",
        "Homepage": "https://github.com/matthewdeanmartin/find_known_secrets",
        "Repository": "https://github.com/matthewdeanmartin/find_known_secrets"
    },
    "split_keywords": [
        "secrets"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "700fbde24d9ca93bca2d03390f2bd1758934510ee20c8d853d4a5126557aec3e",
                "md5": "262d14138b4ccbd116e872e3f35c8d91",
                "sha256": "586ebdcca953a64a33aa7ecc358eddf1e4c646fee6525df0c7fea542981bb636"
            },
            "downloads": -1,
            "filename": "find_known_secrets-1.3.0-py2.py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "262d14138b4ccbd116e872e3f35c8d91",
            "packagetype": "bdist_wheel",
            "python_version": "py2.py3",
            "requires_python": null,
            "size": 6226,
            "upload_time": "2023-05-29T13:51:00",
            "upload_time_iso_8601": "2023-05-29T13:51:00.821098Z",
            "url": "https://files.pythonhosted.org/packages/70/0f/bde24d9ca93bca2d03390f2bd1758934510ee20c8d853d4a5126557aec3e/find_known_secrets-1.3.0-py2.py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "2882e9625c52833b517c5da864d173e0b8bee4241e828b0a3fa2a107db036b99",
                "md5": "07706554132411006449f8920082939f",
                "sha256": "f3e3ef11f8a82d71d77fd515536ecac0c88651c964eda60393d1f2391d833d16"
            },
            "downloads": -1,
            "filename": "find_known_secrets-1.3.0.tar.gz",
            "has_sig": false,
            "md5_digest": "07706554132411006449f8920082939f",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 5437,
            "upload_time": "2023-05-29T13:51:02",
            "upload_time_iso_8601": "2023-05-29T13:51:02.733082Z",
            "url": "https://files.pythonhosted.org/packages/28/82/e9625c52833b517c5da864d173e0b8bee4241e828b0a3fa2a107db036b99/find_known_secrets-1.3.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-05-29 13:51:02",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "matthewdeanmartin",
    "github_project": "find_known_secrets",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "find-known-secrets"
}
        
Elapsed time: 0.12952s