# Tell Me Your Secrets
![CI](https://github.com/valayDave/tell-me-your-secrets/workflows/CI/badge.svg)
[![Codacy Badge](https://api.codacy.com/project/badge/Grade/b125fc056a22454db44a73f53efee1fb)](https://app.codacy.com/gh/valayDave/tell-me-your-secrets?utm_source=github.com&utm_medium=referral&utm_content=valayDave/tell-me-your-secrets&utm_campaign=Badge_Grade_Settings)
[![Codacy Badge](https://app.codacy.com/project/badge/Coverage/54d135292db445ec8eb988b57c747dc2)](https://www.codacy.com/gh/valayDave/tell-me-your-secrets/dashboard?utm_source=github.com&utm_medium=referral&utm_content=valayDave/tell-me-your-secrets&utm_campaign=Badge_Coverage)
[![PyPI version](https://badge.fury.io/py/tell-me-your-secrets.svg)](https://badge.fury.io/py/tell-me-your-secrets)
![PyPI downloads](https://img.shields.io/pypi/dm/tell-me-your-secrets)
A simple module which finds files with different secrets keys present inside a directory. Secrets derived from 120 different signatures.
## Installation
With [pipx](https://pipxproject.github.io/pipx/):
```bash
pipx install tell-me-your-secrets
```
With Pip:
```bash
pip install tell-me-your-secrets
```
From source:
```bash
git clone git@github.com:valayDave/tell-me-your-secrets.git
cd tell-me-your-secrets
poetry install
```
## Module Usage
```bash
tell-me-your-secrets [-h] [-c CONFIG] [-w WRITE] [-f FILTER [FILTER ...]] [-v] [-e] [-g] search_path
```
![](Resources/output_example.gif)
## Usage Examples
- ``tell-me-your-secrets -c new_config.yml /home`` : Find secrets in the home directory according to the provided config file. ``config.yml`` structure provided in the next section.
- ``tell-me-your-secrets /home -f aws microsoft crypto digitalocean ssh sql google`` : Will use the [default config](https://github.com/valayDave/tell-me-your-secrets/blob/master/tell_me_your_secrets/config.yml) and filter signatures according to those keywords.
## Module Configuration
The `config.yml` file contains the configuration for the module. All signatures derived from the config file.
```yaml
blacklisted_extensions: [] # list of extensions to ignore
blacklisted_paths: [] # list of paths to ignore
red_flag_extensions: [] # list of Extensions not be ignored
whitelisted_strings: [] # Add strings which should always be ignored
signatures: # list of signatures to check
- part: '' # either filename, extension, path or contents
match: '' # simple text comparison (if no regex element)
regex: '' # regex pattern (if no match element)
name: '' # name of the signature
```
## Contributing
- Fork this repo
- Create pull requests against the master branch
- Be sure to add tests for changes or additional functionality
- Ensure that the PR description clearly describes the behaviour of the change
- Ensure that CI tests pass
### Setup environment
```bash
python -m venv .venv
source .venv/bin/activate
pip install -r requirements-test.txt
```
#### Pre-commit
We leverage the [pre-commit](https://pre-commit.com/) framework.
Install git hooks with `pre-commit install`.
Run the checks `pre-commit run --all-files`.
## Module Inspiration
As a sysadmin, when machines are provisioned on the cloud to developers, some recklessly leave secret keys and files behind on those machines. This module helps find such leakages.
## Module Credits
- Signatures Derived from [shhgit](https://github.com/eth0izzle/shhgit)
- Available Signatures :
```
Chef private key, Potential Linux shadow file, Potential Linux passwd file, Docker configuration file, NPM configuration file, Environment configuration file, Contains a private key, AWS Access Key ID Value, AWS Access Key ID, AWS Account ID, AWS Secret Access Key, AWS Session Token, Artifactory, CodeClimate, Facebook access token, Google (GCM) Service account, Stripe API key, Google OAuth Key, Google Cloud API Key
Google OAuth Access Token, Picatic API key, Square Access Token, Square OAuth Secret, PayPal/Braintree Access Token, Amazon MWS Auth Token, Twilo API Key, MailGun API Key, MailChimp API Key, SSH Password, Outlook team, Sauce Token, Slack Token, Slack Webhook, SonarQube Docs API Key, HockeyApp, Username and password in URI, NuGet API Key, Potential cryptographic private key, Log file, Potential cryptographic key bundle, Potential cryptographic key bundle
Potential cryptographic key bundle, Potential cryptographic key bundle, Pidgin OTR private key, OpenVPN client configuration file, Azure service configuration schema file, Remote Desktop connection file, Microsoft SQL database file, Microsoft SQL server compact database file, SQLite database file, SQLite3 database file, Microsoft BitLocker recovery key file
Microsoft BitLocker Trusted Platform Module password file, Windows BitLocker full volume encrypted data file, Java keystore file, Password Safe database file, Ruby On Rails secret token configuration file, Carrierwave configuration file, Potential Ruby On Rails database configuration file, OmniAuth configuration file, Django configuration file
1Password password manager database file, Apple Keychain database file, Network traffic capture file, GnuCash database file, Jenkins publish over SSH plugin file, Potential Jenkins credentials file, KDE Wallet Manager database file, Potential MediaWiki configuration file, Tunnelblick VPN configuration file, Sequel Pro MySQL database manager bookmark file, Little Snitch firewall configuration file, Day One journal file, Potential jrnl journal file, Chef Knife configuration file, cPanel backup ProFTPd credentials file
Robomongo MongoDB manager configuration file, FileZilla FTP configuration file, FileZilla FTP recent servers file, Ventrilo server configuration file, Terraform variable config file, Shell configuration file, Shell configuration file, Shell configuration file, Private SSH key, Private SSH key, Private SSH key, Private SSH key, SSH configuration file, Potential cryptographic private key, Shell command history file
MySQL client command history file, PostgreSQL client command history file, PostgreSQL password file, Ruby IRB console history file, Pidgin chat client account configuration file, Hexchat/XChat IRC client server list configuration file, Irssi IRC client configuration file, Recon-ng web reconnaissance framework API key database, DBeaver SQL database manager configuration file, Mutt e-mail client configuration file, S3cmd configuration file, AWS CLI credentials file, SFTP connection configuration file, T command-line Twitter client configuration file, Shell configuration file
Shell profile configuration file, Shell command alias configuration file, PHP configuration file, GNOME Keyring database file, KeePass password manager database file, SQL dump file, Apache htpasswd file, Configuration file for auto-login process, Rubygems credentials file, Tugboat DigitalOcean management tool configuration, DigitalOcean doctl command-line client configuration file, git-credential-store helper credentials file, GitHub Hub command-line client configuration file, Git configuration file
```
## Author
- [Valay Dave](valaygaurang@gmail.com)
## Licence
MIT
Raw data
{
"_id": null,
"home_page": "https://github.com/valayDave/tell-me-your-secrets",
"name": "tell-me-your-secrets",
"maintainer": "",
"docs_url": null,
"requires_python": ">=3.7.1,<4.0.0",
"maintainer_email": "",
"keywords": "Security,SSH,Secret Keys,SysAdmin",
"author": "Valay Dave",
"author_email": "valaygaurang@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/91/ea/c25f4822b860924d5ef81b306ac7b58aad691b54b7c804721671f7fecb57/tell_me_your_secrets-2.4.2.tar.gz",
"platform": null,
"description": "# Tell Me Your Secrets\n\n![CI](https://github.com/valayDave/tell-me-your-secrets/workflows/CI/badge.svg)\n[![Codacy Badge](https://api.codacy.com/project/badge/Grade/b125fc056a22454db44a73f53efee1fb)](https://app.codacy.com/gh/valayDave/tell-me-your-secrets?utm_source=github.com&utm_medium=referral&utm_content=valayDave/tell-me-your-secrets&utm_campaign=Badge_Grade_Settings)\n[![Codacy Badge](https://app.codacy.com/project/badge/Coverage/54d135292db445ec8eb988b57c747dc2)](https://www.codacy.com/gh/valayDave/tell-me-your-secrets/dashboard?utm_source=github.com&utm_medium=referral&utm_content=valayDave/tell-me-your-secrets&utm_campaign=Badge_Coverage)\n[![PyPI version](https://badge.fury.io/py/tell-me-your-secrets.svg)](https://badge.fury.io/py/tell-me-your-secrets)\n![PyPI downloads](https://img.shields.io/pypi/dm/tell-me-your-secrets)\n\n\nA simple module which finds files with different secrets keys present inside a directory. Secrets derived from 120 different signatures.\n\n## Installation\n\nWith [pipx](https://pipxproject.github.io/pipx/):\n\n```bash\npipx install tell-me-your-secrets\n```\n\nWith Pip:\n\n```bash\npip install tell-me-your-secrets\n```\n\nFrom source:\n\n```bash\ngit clone git@github.com:valayDave/tell-me-your-secrets.git\ncd tell-me-your-secrets\npoetry install\n```\n\n## Module Usage\n\n```bash\ntell-me-your-secrets [-h] [-c CONFIG] [-w WRITE] [-f FILTER [FILTER ...]] [-v] [-e] [-g] search_path\n```\n\n![](Resources/output_example.gif)\n\n## Usage Examples\n\n- ``tell-me-your-secrets -c new_config.yml /home`` : Find secrets in the home directory according to the provided config file. ``config.yml`` structure provided in the next section.\n\n- ``tell-me-your-secrets /home -f aws microsoft crypto digitalocean ssh sql google`` : Will use the [default config](https://github.com/valayDave/tell-me-your-secrets/blob/master/tell_me_your_secrets/config.yml) and filter signatures according to those keywords.\n\n## Module Configuration\n\nThe `config.yml` file contains the configuration for the module. All signatures derived from the config file.\n\n```yaml\nblacklisted_extensions: [] # list of extensions to ignore\nblacklisted_paths: [] # list of paths to ignore\nred_flag_extensions: [] # list of Extensions not be ignored\nwhitelisted_strings: [] # Add strings which should always be ignored\nsignatures: # list of signatures to check\n - part: '' # either filename, extension, path or contents\n match: '' # simple text comparison (if no regex element)\n regex: '' # regex pattern (if no match element)\n name: '' # name of the signature\n```\n\n## Contributing\n\n- Fork this repo\n- Create pull requests against the master branch\n- Be sure to add tests for changes or additional functionality\n- Ensure that the PR description clearly describes the behaviour of the change\n- Ensure that CI tests pass\n\n### Setup environment\n\n```bash\npython -m venv .venv\nsource .venv/bin/activate\npip install -r requirements-test.txt\n```\n#### Pre-commit\n\nWe leverage the [pre-commit](https://pre-commit.com/) framework.\n\nInstall git hooks with `pre-commit install`.\n\nRun the checks `pre-commit run --all-files`.\n\n## Module Inspiration\n\nAs a sysadmin, when machines are provisioned on the cloud to developers, some recklessly leave secret keys and files behind on those machines. This module helps find such leakages.\n\n## Module Credits\n\n- Signatures Derived from [shhgit](https://github.com/eth0izzle/shhgit)\n\n- Available Signatures :\n```\nChef private key, Potential Linux shadow file, Potential Linux passwd file, Docker configuration file, NPM configuration file, Environment configuration file, Contains a private key, AWS Access Key ID Value, AWS Access Key ID, AWS Account ID, AWS Secret Access Key, AWS Session Token, Artifactory, CodeClimate, Facebook access token, Google (GCM) Service account, Stripe API key, Google OAuth Key, Google Cloud API Key\nGoogle OAuth Access Token, Picatic API key, Square Access Token, Square OAuth Secret, PayPal/Braintree Access Token, Amazon MWS Auth Token, Twilo API Key, MailGun API Key, MailChimp API Key, SSH Password, Outlook team, Sauce Token, Slack Token, Slack Webhook, SonarQube Docs API Key, HockeyApp, Username and password in URI, NuGet API Key, Potential cryptographic private key, Log file, Potential cryptographic key bundle, Potential cryptographic key bundle\nPotential cryptographic key bundle, Potential cryptographic key bundle, Pidgin OTR private key, OpenVPN client configuration file, Azure service configuration schema file, Remote Desktop connection file, Microsoft SQL database file, Microsoft SQL server compact database file, SQLite database file, SQLite3 database file, Microsoft BitLocker recovery key file\nMicrosoft BitLocker Trusted Platform Module password file, Windows BitLocker full volume encrypted data file, Java keystore file, Password Safe database file, Ruby On Rails secret token configuration file, Carrierwave configuration file, Potential Ruby On Rails database configuration file, OmniAuth configuration file, Django configuration file\n1Password password manager database file, Apple Keychain database file, Network traffic capture file, GnuCash database file, Jenkins publish over SSH plugin file, Potential Jenkins credentials file, KDE Wallet Manager database file, Potential MediaWiki configuration file, Tunnelblick VPN configuration file, Sequel Pro MySQL database manager bookmark file, Little Snitch firewall configuration file, Day One journal file, Potential jrnl journal file, Chef Knife configuration file, cPanel backup ProFTPd credentials file\nRobomongo MongoDB manager configuration file, FileZilla FTP configuration file, FileZilla FTP recent servers file, Ventrilo server configuration file, Terraform variable config file, Shell configuration file, Shell configuration file, Shell configuration file, Private SSH key, Private SSH key, Private SSH key, Private SSH key, SSH configuration file, Potential cryptographic private key, Shell command history file\nMySQL client command history file, PostgreSQL client command history file, PostgreSQL password file, Ruby IRB console history file, Pidgin chat client account configuration file, Hexchat/XChat IRC client server list configuration file, Irssi IRC client configuration file, Recon-ng web reconnaissance framework API key database, DBeaver SQL database manager configuration file, Mutt e-mail client configuration file, S3cmd configuration file, AWS CLI credentials file, SFTP connection configuration file, T command-line Twitter client configuration file, Shell configuration file\nShell profile configuration file, Shell command alias configuration file, PHP configuration file, GNOME Keyring database file, KeePass password manager database file, SQL dump file, Apache htpasswd file, Configuration file for auto-login process, Rubygems credentials file, Tugboat DigitalOcean management tool configuration, DigitalOcean doctl command-line client configuration file, git-credential-store helper credentials file, GitHub Hub command-line client configuration file, Git configuration file\n```\n\n## Author\n\n- [Valay Dave](valaygaurang@gmail.com)\n\n## Licence\n\nMIT\n\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "A simple module which finds files with different secrets keys present inside a directory",
"version": "2.4.2",
"split_keywords": [
"security",
"ssh",
"secret keys",
"sysadmin"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "f0977047498f43c78d2a94c18d25cba3defbe6afbe25e714a25b9d114ce2e0c1",
"md5": "e860586c1da4662bc9c3b3066f849118",
"sha256": "ea3e32b58ee89ca59b83e0e4ffd547a78eaa3b93bfdb7b8ce6d7e1e444e185ac"
},
"downloads": -1,
"filename": "tell_me_your_secrets-2.4.2-py3-none-any.whl",
"has_sig": false,
"md5_digest": "e860586c1da4662bc9c3b3066f849118",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.7.1,<4.0.0",
"size": 16014,
"upload_time": "2023-04-02T19:33:00",
"upload_time_iso_8601": "2023-04-02T19:33:00.911499Z",
"url": "https://files.pythonhosted.org/packages/f0/97/7047498f43c78d2a94c18d25cba3defbe6afbe25e714a25b9d114ce2e0c1/tell_me_your_secrets-2.4.2-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "91eac25f4822b860924d5ef81b306ac7b58aad691b54b7c804721671f7fecb57",
"md5": "94a8374b54ba8be397b1b807d5f91117",
"sha256": "140b1ef862ab60186c673408f073718258346d9f8f8ee2e0b57c636b5bd61e49"
},
"downloads": -1,
"filename": "tell_me_your_secrets-2.4.2.tar.gz",
"has_sig": false,
"md5_digest": "94a8374b54ba8be397b1b807d5f91117",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.7.1,<4.0.0",
"size": 15163,
"upload_time": "2023-04-02T19:33:02",
"upload_time_iso_8601": "2023-04-02T19:33:02.068921Z",
"url": "https://files.pythonhosted.org/packages/91/ea/c25f4822b860924d5ef81b306ac7b58aad691b54b7c804721671f7fecb57/tell_me_your_secrets-2.4.2.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-04-02 19:33:02",
"github": true,
"gitlab": false,
"bitbucket": false,
"github_user": "valayDave",
"github_project": "tell-me-your-secrets",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"tox": true,
"lcname": "tell-me-your-secrets"
}