Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/repoog/gitprey

Searching sensitive files and contents in GitHub associated to company name or other key words
https://github.com/repoog/gitprey

github hacking-tool information-security

Last synced: about 2 months ago
JSON representation

Searching sensitive files and contents in GitHub associated to company name or other key words

Awesome Lists containing this project

README

        

## GitHub敏感信息扫描工具
![](https://img.shields.io/github/license/repoog/GitPrey.svg)
[![Twitter](https://img.shields.io/twitter/url/https/github.com/repoog/GitPrey.svg?style=social)](https://twitter.com/intent/tweet?text=Wow:&url=https%3A%2F%2Fgithub.com%2Frepoog%2FGitPrey)
### 功能设计
GitPrey是根据企业关键词进行项目检索以及相应敏感文件和敏感文件内容扫描的工具,其设计思路如下:
* 根据关键词在GitHub中进行全局代码内容和路径的搜索(in:file,path),将项目结果做项目信息去重整理得到所有关键词相关的项目,即疑似项目结果;
* 基于PATTERN_DB中的敏感文件名或敏感代码对所有疑似项目做文件名搜索(filename:)和代码搜索(in:file);
* 将匹配搜索到的结果按照项目整理输出;
由于无法做到精确匹配和精确识别,因此扫描结果或存在一定的漏报(比如项目中未出现关键词路径或内容)或误报(比如第三方项目引用关键词内容)情况,其中漏报的原因还包括GitHub的搜索限制:
* 默认只搜索主分支代码,多数情况下是master分支;
* GitHub最大只允许搜索1000条代码项,即100页代码;
* 代码搜索仅搜索不大于384Kb的文件;

此外,不同关键词搜索的疑似项目数量不同,少则数个,多则数十个甚至数百个,并会对搜索和扫描时间造成直接影响(另一影响因素是匹配的文件名关键词数量和内容关键词数量),项目和关键词越多,扫描时间越长。因此可以根据需要进行扫描深度的选择,这一维度由GitHub最近索引(Recently Indexed)排序的代码页决定,深度越深,检索的项目数量越多,反之亦然。深度选项和说明如下:
* Level 1:检索最近索引的前10页代码页;
* Level 2:检索最近索引的前20页代码页;
* Level 3:检索最近索引的前50页代码页;
* Level 4:检索最近索引的前70页代码页;
* Level 5:检索最近索引的前100页代码页;

深度选择与企业扫描周期性应该成正相关,深度选择小,则相应扫描的周期性也应当较小,如深度选择为Level 1,则相应的扫描周期基于企业情况可定为每天或每周,深度选择为Level 5,则相应的扫描周期可适当延长。例如,关键词“Google”最大(Level 5)可搜索两天前上传的项目代码,而关键词“repoog”搜索结果则不足1页。

### 技术实现
项目配置文件Config.py中需要配置使用者的GitHub用户名、密码:
* 未登录GitHub进行代码搜索会因为请求速度过快(约10页代码结果页)而返回HTTP STATUE 429,即Too Many Requests的错误,因此需要登录后进行搜索;
* 在项目内关键词文件名和关键词内容扫描时未采用API,原因有两点:一是搜索代码的API频率限制很大(认证后30次/分钟)无法满足快速搜索;二是某些项目关键词的搜索结果项超过100条,而API在设置per_page参数后至多支持展现100条结果项;
项目配置文件Config.py中需要配置FILE_DB/INFO_DB/PASS_DB/PATH_DB项,用途如下:_
* 敏感文件搜索是基于配置项中的PATH_DB内容检索特定文件的泄漏;
* 敏感内容搜索是基于PASS_DB和FILE_DB进行检索,再根据INFO_DB和PASS_DB输出相关代码行;_

### 程序使用
GitPrey v2.2版本后去除了ACCESS_TOKEN的配置以及配置文件中的SEARCH_LEVEL和KEYWORDS配置项,改用命令行参数方式执行:
```
USAGE:
-l Set level for searching within 1~5, default level is 1.
-k Set key words for searching projects.
-h Show help information.
```
* -l:选填参数,用于设置代码搜索深度;
* -k:必填参数,用于设置搜索关键词,若关键词中包含空白字符,需用双引号将关键词括起来;
* -h:帮助信息。

### 文件配置
pattern为搜索项文件配置目录,相关文件说明如下:
* path.db:敏感文件名或文件后缀,用于搜索文件名,如:htpasswd
* file.db:敏感内容关键词搜索的文件名称范围,内容搜索在该文件名称范围内进行,如:.env
* info.db:敏感内容关键词(由于AND/OR/NOT操作符在GitHub单次搜索中最多支持五个,故关键词会进行轮询),如:password

### 程序更新
* v1.0 初始版本
* v2.0 更新搜索设计和算法
* v2.1 更新搜索结果输出展现
* v2.2 优化部分代码,增加项目搜索进度条,解决代码输出BUG
* v2.4 优化程序目录设计,优化源码实现,增加默认文件输出
* v2.5 优化代码搜索为整页代码搜索,优化颜色输出及文件输出,优化代码实现
* v2.6 更新Python版本到Python3.6,修正GitHub页面爬虫

***
## Sensitive info scan tool of GitHub
### Function introduction and design
GitPrey is a tool for searching sensitive information or data according to company name or key word something.The design mind is from searching sensitive data leakling in GitHub:
* Search code in file and path according to key word to get all related projects;
* Search code in every related project to find matching file or content in PATTERN_DB;
* Output all matching file information,project information and user information;

By the way, there is some missing file or mistake file with using Gitprey,the reason is:
* Only the default branch is considered by GitHub. In most cases, this will be the master branch.
* Only files smaller than 384 KB are searchable by GitHub.
* GitHub only make up to 1,000 results for each search.

Gitprey also provides the search level to adjust scanning deep, it's between Level 1 to Level 5:
* Level 1: Only search 10 pages in recently indexed code results.
* Level 2: Only search 20 pages in recently indexed code results.
* Level 3: Only search 50 pages in recently indexed code results.
* Level 4: Only search 70 pages in recently indexed code results.
* Level 5: Only search 100 pages in recently indexed code results.

You can modify the Level in Config.py.To search as quick as you can,you must configure your own GitHub account username and password to avoid 429 ERROR which is too many requests.

### Tech detail introduction
There are some hints to declare about technological details:
* GitHub API is not used in searching code,because its rate limit up to 30 times per minute,even if you authenticate by access token.
* Only user information crawler used GitHub API,it's enough for scanning speed.
You have to config FILE_DB/INFO_DB/PASS_DB/PATH_DB in config.py:
* PATH_DB is used to search specific file in related projects when searching file leaking.
* FILE_DB and PASS_DB are used to searching sensitive content in related projects when searching content leaking, while INFO_DB and PASS_DB is used to output code line._

### GitPrey usage
GitPrey removed ACCESS_TOKEN, SEARCH_LEVEL and KEYWORDS configuration from v2.2:
USAGE:
-l Set search level for searching projects within 1-5, default level is 1.
-k Set key words for searching projects.
-h Show help information.

### pattern file introduction
pattern is a directory putting db files:
* path.db: sensitive file path, such as htpasswd
* file.db: the files name which sensitive content maybe in, such as .env
* info.db: sensitive content key words for searching, such as password