mirror of
https://github.com/moltbot/moltbot.git
synced 2026-03-08 06:54:24 +00:00
* Tests: stabilize detect-secrets fixtures * Tests: fix rebased detect-secrets false positives * Docs: keep snippets valid under detect-secrets * Tests: finalize detect-secrets false-positive fixes * Tests: reduce detect-secrets false positives * Tests: keep detect-secrets pragmas inline * Tests: remediate next detect-secrets batch * Tests: tighten detect-secrets allowlists * Tests: stabilize detect-secrets formatter drift
44 lines
2.2 KiB
INI
44 lines
2.2 KiB
INI
# detect-secrets exclusion patterns (regex)
|
|
#
|
|
# Note: detect-secrets does not read this file by default. If you want these
|
|
# applied, wire them into your scan command (e.g. translate to --exclude-files
|
|
# / --exclude-lines) or into a baseline's filters_used.
|
|
|
|
[exclude-files]
|
|
# pnpm lockfiles contain lots of high-entropy package integrity blobs.
|
|
pattern = (^|/)pnpm-lock\.yaml$
|
|
|
|
[exclude-lines]
|
|
# Fastlane checks for private key marker; not a real key.
|
|
pattern = key_content\.include\?\("BEGIN PRIVATE KEY"\)
|
|
# UI label string for Anthropic auth mode.
|
|
pattern = case \.apiKeyEnv: "API key \(env var\)"
|
|
# CodingKeys mapping uses apiKey literal.
|
|
pattern = case apikey = "apiKey"
|
|
# Schema labels referencing password fields (not actual secrets).
|
|
pattern = "gateway\.remote\.password"
|
|
pattern = "gateway\.auth\.password"
|
|
# Schema label for talk API key (label text only).
|
|
pattern = "talk\.apiKey"
|
|
# checking for typeof is not something we care about.
|
|
pattern = === "string"
|
|
# specific optional-chaining password check that didn't match the line above.
|
|
pattern = typeof remote\?\.password === "string"
|
|
# Docker apt signing key fingerprint constant; not a secret.
|
|
pattern = OPENCLAW_DOCKER_GPG_FINGERPRINT=
|
|
# Credential matrix metadata field in docs JSON; not a secret value.
|
|
pattern = "secretShape": "(secret_input|sibling_ref)"
|
|
# Docs line describing API key rotation knobs; not a credential.
|
|
pattern = API key rotation \(provider-specific\): set `\*_API_KEYS`
|
|
# Docs line describing remote password precedence; not a credential.
|
|
pattern = passw[o]rd: `OPENCLAW_GATEWAY_PASSW[O]RD` -> `gateway\.auth\.passw[o]rd` -> `gateway\.remote\.passw[o]rd`
|
|
pattern = passw[o]rd: `OPENCLAW_GATEWAY_PASSW[O]RD` -> `gateway\.remote\.passw[o]rd` -> `gateway\.auth\.passw[o]rd`
|
|
# Test fixture starts a multiline fake private key; detector should ignore the header line.
|
|
pattern = const key = `-----BEGIN PRIVATE KEY-----
|
|
# Docs examples: literal placeholder API key snippets and shell heredoc helper.
|
|
pattern = export CUSTOM_API_K[E]Y="your-key"
|
|
pattern = grep -q 'N[O]DE_COMPILE_CACHE=/var/tmp/openclaw-compile-cache' ~/.bashrc \|\| cat >> ~/.bashrc <<'EOF'
|
|
pattern = env: \{ MISTRAL_API_K[E]Y: "sk-\.\.\." \},
|
|
pattern = "ap[i]Key": "xxxxx",
|
|
pattern = ap[i]Key: "A[I]za\.\.\.",
|