Bump secret-detection-rules to version v0.20.0 for Pipeline and Push Protection
Context
SD rules introduces following new rules across the versions:
- Add rule
AWSCognitoIdentityPoolIDfor Pipeline SD@lmoratti - Add rule
AWSSecretAccessKeyfor Pipeline SD - Add rule
AWSSessionTokenfor Pipeline SD and Push Protection - Enhance rule
anthropic_key - Enhance rule
AWSAccess Key ID rule covering different scenarios - Remove rule
AWSSTSKeyand merge it withAWSrule pattern - Add rule
AWSBedrockShortLivedKeyfor Pipeline SD and Push Protection
- Enhance rule
Mapbox API token - Remove duplicated rule
Tailscale key - Enable rule
TailscaleOauthClientSecretfor Pipeline and Push Protection - Enable rule
TailscaleApiAccessTokenfor Pipeline and Push Protection - Enable rule
TailscalePersonalAuthKeyfor Pipeline and Push Protection - Enable rule
SlackAppConfigurationRefreshTokenfor Pipeline and Push Protection - Enable rule
SlackAppConfigurationTokenfor Pipeline and Push Protection - Enable rule
ShopifyPartnerAPITokenfor Pipeline and Push Protection - Enable rule
PostmanCollectionAccessKeyfor Pipeline and Push Protection - Enhance rule
Postman API tokenand enable for Push Protection - Narrow duplicated rule
open ai tokendown to legacy user keys - Enable rule
OpenAiServiceAdminKeyfor Pipeline and Push Protection - Enable rule
OpenAiServiceAccountKeyfor Pipeline and Push Protection - Enable rule
OpenAiProjectKeyfor Pipeline and Push Protection - Enable rule
MapboxSecretApiTokenfor Pipeline detection - Enable rule
IntercomAppAccessTokenfor Pipeline and Push Protection - Remove duplicated rule
Grafana API token - Enable rule
GrafanaServiceAccountTokenfor Pipeline and Push Protection - Enable rule
GrafanaCloudAccessPolicyTokenfor Pipeline and Push Protection - Enable rule
FlutterwaveProdEncryptedKeyfor Pipeline and Push Protection - Enable rule
FlutterwaveProdSecretKeyfor Pipeline and Push Protection - Enable rule
FlutterwaveProdPublicKeyfor Pipeline and Push Protection - Enable rule
DropboxAppAccessTokenfor Pipeline and Push Protection - Fix
Heroku API Keyrule and enable SPP
Implementation plan
-
Follow the release procedure outlined in https://gitlab.com/gitlab-org/security-products/secret-detection/secret-detection-rules#release-process -
Secret Detection Analyzer: gitlab-org/security-products/analyzers/secrets!427 (merged) -
Secret Detection Gem (for Push Protection): gitlab-org/security-products/secret-detection/secret-detection-service!145 (merged)
-
-
GitLab Rails: !211238 (merged) -
Documentation: Update SD Rules Table Matrix (!211037 - merged) -
Release Post: gitlab-com/www-gitlab-com!141436
GitLab Rails: Gem Update Instructions
Run the following commands in the gitlab directory to update the gem:
bundle install
mise exec -- bundle update --conservative gitlab-secret_detection
bundle exec rake bundler:gemfile:sync
Release Post Issue Template
Example Reference: gitlab-com/www-gitlab-com!141272 (merged)
Template:
---
features:
secondary:
- name: "Increased rule coverage for secret push protection and pipeline secret detection"
available_in: [free, premium, ultimate]
gitlab_com: true
self_managed: true
gitlab_dedicated: true
add_ons: []
documentation_link: 'https://docs.gitlab.com/user/application_security/secret_detection/detected_secrets'
reporter: amarpatel
stage: application_security_testing
categories:
- Secret Detection
issue_url: 'https://gitlab.com/gitlab-org/gitlab/-/issues/573973'
description: |
GitLab's pipeline secret detection now includes additional rules in [version <version>](https://gitlab.com/gitlab-org/security-products/analyzers/secrets/-/releases/<version>) of the secrets analyzer. We've also refined existing rules to improve detection quality and minimize false positives.
Edited by Vishwa Bhat