repo-supervisor v3.0 releases: Scan your code for security misconfiguration, search for passwords and secrets
A serverless tool that detects secrets and passwords in your pull requests – one file at a time.
It happens sometimes that you can commit secrets or passwords to your repository by accident. The recommended best practice is not commit the secrets, that’s obvious. But not always that obvious when you have a big merge waiting to be reviewed.
This tool allows you to set up a
webhook that waits for the Pull Requests and scans all interesting files to check for leaked secrets. Every time PR is updated it rescans the latest changes and generates a report.
Both acknowledge and rejection actions are triggering Slack notification which allows to whether to improve or fix secrets detection rules.
Acknowledge report (YES): Approve that report as valid, detected strings are actual secrets.
Reject report (NO): Reject report, detected secrets are not credentials but only object identifiers, messages or other not related strings. It will help to improve the false-positives ratio.
Tool is easily extendable by adding new filter and parsers for a specific format, for now we support
- Entropy Meter – measures the level of entropy for extracted strings. The higher the entropy the higher probability of detecting a secret/password.
This release adds the AWS Lambda support and deprecates the usage of Webtask. It consists of breaking changes.
- AWS Lambda support
- Use package-lock instead of shrinkwrap
- Add .editorconfig file
- Async/await for better handling of asynchronous actions
- Updated documentation
Copyright (c) 2017 Auth0, Inc. <email@example.com> (https://auth0.com)