Skip to content

Secrets analyzer false positive with password url detection

Everyone can contribute. Help move this issue forward while earning points, leveling up and collecting rewards.

Summary

Secrets analyser with gitleaks detects some false positive since v.3.24.0

Steps to reproduce

  1. Add SwaggerUI js/css bundle to your project
  2. Run a pipeline to detect secrets
  3. See job result

Example Project

Example available here : https://gitlab.com/qdesbin/example-secret-analyzer-false-positif-swagger-ui/-/jobs/2017271069

What is the current bug behavior?

This issue is to provide example of false positive detected in order to adapt/correct the regex for the analyzer

What is the expected correct behavior?

Don't detect "password in URL" in this case

Relevant logs and/or screenshots

N/A

Output of checks

Tested and reproduced on Gitlab.com with shared runners

Results of GitLab environment info

N/A

Results of GitLab application Check

N/A

Possible fixes

Edited by 🤖 GitLab Bot 🤖