GSIL: GitHub Sensitive Information Leakage
GSIL(GitHub Sensitive Information Leak)
Monitor Github sensitive information leaks in near real time and send alert notifications.
Installation
Python3(Python2 is not tested)
$ git clone https://github.com/FeeiCN/gsil.git
$ cd gsil/
$ pip install -r requirements.txt
Configuration
gsil/config.gsil: Alarm mailbox and Github configuration
gsil/rules.gsil: scanning rules
Generally, The best rule is the characteristic code of the intranet(Example: mogujie’s extranet is
mogujie.com
, intranet ismogujie.org
. At this time,mogujie.org
can be used as a rule)
There are other similar code head characteristic code, external mailbox characteristic code, and so on
field meaning optional default describe keyword key word required – When multiple keywords are used, space segmentation is used(Example: 'username password'
), When you need a precise search, use double(Example:"quotesele.me"
)ext file suffix optional all suffixes Multiple suffixes are separated by comma(Example: java,php,python
)mode matching mode optional normal-match normal-match
(The line that contains the keyword is matched, and the line near the line is matched) /only-match
(Only the lines that match the key words7) /full-match
(Not recommended for use)(The search results show the entire file)
Usage
GSIL Copyright (C) 2018 FeeiCN
Source: https://github.com/FeeiCN/