-
Notifications
You must be signed in to change notification settings - Fork 2
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Problem
CodeRabbit integrates 40+ linters and scanners. GitHub Copilot blends CodeQL results. DiffScope has a Semgrep plugin but no built-in secrets detection. Hardcoded API keys, passwords, and tokens in diffs should be caught without requiring external tool setup.
Proposed Solution
-
Built-in regex-based secrets scanner that runs on every diff:
- AWS access keys (
AKIA...) - GitHub tokens (
ghp_,gho_,ghs_) - Generic API keys (high-entropy strings in assignments)
- Private keys (PEM headers)
- Connection strings with passwords
- JWT tokens
- Slack webhooks/tokens
- AWS access keys (
-
Run as a pre-analysis step (like existing plugins) — findings injected into the review context
-
Configurable allowlist for false positives (test fixtures, examples)
-
Severity: always critical — secrets in diffs should block merge in CI mode
Implementation
- Pattern library inspired by truffleHog/gitleaks patterns
- Entropy-based detection for generic secrets
.diffscope-secrets-allowlistfor false positive suppression
Priority
Tier 3 — Security hygiene. Low effort, high value.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request