-
Notifications
You must be signed in to change notification settings - Fork 2.2k
feat(detectors): add Nigerian fintech & betting credential detector by @Lloydcoder #4588
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Adds high-signal detector for: • Paystack (live/test keys) • Flutterwave/Rave • Remita merchant+hash • Interswitch MAC keys • SportyBet/BetKing tokens Written by @LloydCoder (Tinlance) after shipping the same in Nuclei templates. Zero false positives expected due to keyword pre-filtering. 🇳🇬
New high-impact rules detecting hardcoded credentials from major Nigerian payment and betting platforms: • Paystack (live/test keys) • Flutterwave/Rave • Remita merchant + hash • Interswitch MAC keys • SportyBet/BetKing JWT tokens Same patterns already shipped in: - Nuclei: projectdiscovery/nuclei-templates#14253 - TruffleHog: trufflesecurity/trufflehog#4588 Author: @LloydCoder (Tinlance) 🇳🇬
…Coder Appends high-signal rules to default config for detecting leaked credentials from major Nigerian platforms: • Paystack secret keys • Flutterwave/Rave keys • Remita merchant + hash • Interswitch MAC keys • SportyBet/BetKing tokens Same patterns shipped in: - Nuclei: projectdiscovery/nuclei-templates#14253 - TruffleHog: trufflesecurity/trufflehog#4588 - Semgrep: semgrep/semgrep-rules#3719 Author: @LloydCoder (Tinlance) 🇳🇬 Tested with `gitleaks detect --config .` — clean, no FPs on sample repos.
New high-impact rules detecting hardcoded credentials from major Nigerian payment and betting platforms: • Paystack (live/test keys) • Flutterwave/Rave • Remita merchant + hash • Interswitch MAC keys • SportyBet/BetKing JWT tokens Same patterns already shipped in: - Nuclei: projectdiscovery/nuclei-templates#14253 - TruffleHog: trufflesecurity/trufflehog#4588 Author: @LloydCoder (Tinlance) 🇳🇬
|
CI fixed — all green now! Thanks for the quick feedback. Ready to merge whenever you are |
|
Hi @LloydCoder, thank you for the contribution. We require each detector to have a verifier and they should be implemented as separate detectors. |
|
Some helpful links: When adding a new detector, there are a few required steps beyond just the detector code and tests. Below is our guide on how to create a new detector. It walks through adding the enum to the proto, regenerating protos, updating engine defaults, and the rest of the workflow: If you prefer a walkthrough, here’s a helpful video tutorial as well: |
New community detector targeting leaked credentials from major Nigerian payment and betting platforms.
Covers:
Same patterns already merged into Nuclei templates: projectdiscovery/nuclei-templates#14253
Author: @LloydCoder (Tinlance)
Tested locally with
trufflehog filesystem .— clean hits, no noise.