Skip to content

Add new Looker client ID and client secret rules#1947

Merged
zricethezav merged 1 commit intogitleaks:masterfrom
chris-is:feature/looker-rules
Nov 20, 2025
Merged

Add new Looker client ID and client secret rules#1947
zricethezav merged 1 commit intogitleaks:masterfrom
chris-is:feature/looker-rules

Conversation

@chris-is
Copy link
Contributor

@chris-is chris-is commented Sep 21, 2025

Description:

Add two provider-specific rules to detect leaked Looker SDK API3 credentials: looker-client-id and looker-client-secret. These rules target alphanumeric client_id (20 chars) and client_secret (24 chars) commonly committed in configuration (for example, looker.ini), environment variables, and inline literals. The implementation uses SemiGeneric patterns keyed on the “looker” identifier plus deterministic length constraints. This helps prevent unauthorized access to Looker instances and sensitive analytics data.

Checklist:

  • Does your PR pass tests?
  • Have you written new tests for your changes?
    Not applicable
  • Have you lint your code locally prior to submission?

@chris-is
Copy link
Contributor Author

Closes #1946

@zricethezav zricethezav merged commit 09242ce into gitleaks:master Nov 20, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants