{ "info": { "author": "Matthew Martin", "author_email": "matthewdeanmartin@gmail.com", "bugtrack_url": null, "classifiers": [ "Programming Language :: Python", "Programming Language :: Python :: 2.7", "Programming Language :: Python :: 3.5", "Programming Language :: Python :: 3.6", "Programming Language :: Python :: Implementation :: CPython", "Programming Language :: Python :: Implementation :: PyPy" ], "description": "find_known_secrets\n==================\n\nScan for known secrets in your source code before you check in\n\nbadges\n------\n\n|MIT licensed| |Read the Docs| |Build Status| |Coverage Status| |BCH\ncompliance|\n\nThree Ways to Detect Secrets\n----------------------------\n\nPattern detection - use grep to find words like \u201cpassword\u201d. git-secrets\ndoes this as well as pylint.\n\nHigh entropy detection - detect-secrets does this.\n\nSearch for known secrets - Some secrets are found in conventional\nlocations, such as AWS keys. They are typically key value pairs. As far\nas I known, this is a novel approach as of July 2018. So I wrote one.\n\nAll three approaches have different failure profiles.\n\n.. |MIT licensed| image:: https://img.shields.io/badge/license-MIT-blue.svg\n :target: https://raw.githubusercontent.com/hyperium/hyper/master/LICENSE\n.. |Read the Docs| image:: https://img.shields.io/readthedocs/pip.svg\n.. |Build Status| image:: https://travis-ci.com/matthewdeanmartin/find_known_secrets.svg?branch=master\n :target: https://travis-ci.com/matthewdeanmartin/find_known_secrets\n.. |Coverage Status| image:: https://coveralls.io/repos/github/matthewdeanmartin/find_known_secrets/badge.svg?branch=master\n :target: https://coveralls.io/github/matthewdeanmartin/find_known_secrets?branch=master\n.. |BCH compliance| image:: https://bettercodehub.com/edge/badge/matthewdeanmartin/find_known_secrets?branch=master\n :target: https://bettercodehub.com/", "description_content_type": "", "docs_url": null, "download_url": "", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "https://github.com/matthewdeanmartin/find_known_secrets", "keywords": "version,build tools", "license": "MIT", "maintainer": "", "maintainer_email": "", "name": "find-known-secrets", "package_url": "https://pypi.org/project/find-known-secrets/", "platform": "", "project_url": "https://pypi.org/project/find-known-secrets/", "project_urls": { "Homepage": "https://github.com/matthewdeanmartin/find_known_secrets" }, "release_url": "https://pypi.org/project/find-known-secrets/1.0.30/", "requires_dist": null, "requires_python": "", "summary": "Find secrets in your source code using lists of secrets you already know", "version": "1.0.30" }, "last_serial": 4157994, "releases": { "1.0.30": [ { "comment_text": "", "digests": { "md5": "821b9913104cb3d37413479b72927de6", "sha256": "50fb3cfc093317b8adda667f8d8d136667fb1a8a37183eb611aed14fe2d3d279" }, "downloads": -1, "filename": "find_known_secrets-1.0.30.tar.gz", "has_sig": false, "md5_digest": "821b9913104cb3d37413479b72927de6", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 5645, "upload_time": "2018-08-10T18:28:21", "url": "https://files.pythonhosted.org/packages/02/ae/d84d34a8331bfb2235438870865f3e688c91b7bb905f5b78ced6c94c540e/find_known_secrets-1.0.30.tar.gz" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "821b9913104cb3d37413479b72927de6", "sha256": "50fb3cfc093317b8adda667f8d8d136667fb1a8a37183eb611aed14fe2d3d279" }, "downloads": -1, "filename": "find_known_secrets-1.0.30.tar.gz", "has_sig": false, "md5_digest": "821b9913104cb3d37413479b72927de6", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 5645, "upload_time": "2018-08-10T18:28:21", "url": "https://files.pythonhosted.org/packages/02/ae/d84d34a8331bfb2235438870865f3e688c91b7bb905f5b78ced6c94c540e/find_known_secrets-1.0.30.tar.gz" } ] }