-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathgitguardian.yml
More file actions
44 lines (37 loc) · 1.3 KB
/
gitguardian.yml
File metadata and controls
44 lines (37 loc) · 1.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
# .gitguardian.yml
# MANDATORY GitGuardian Secret Scanning Configuration
version: 2
# Files and paths to exclude from scanning
paths-ignore:
# Terraform state files (contain encrypted data)
- "**/*.tfstate"
- "**/*.tfstate.backup"
- ".terraform/**"
- "**/.terraform.lock.hcl"
# Build and cache directories
- "**/node_modules/**"
- "**/.git/**"
- "**/vendor/**"
- "**/.venv/**"
- "**/__pycache__/**"
# Test fixtures (if any)
- "**/test/fixtures/**"
- "**/tests/fixtures/**"
# Known safe patterns (use sparingly)
matches-ignore:
# Example patterns only - adjust for your needs
- name: "Example secrets in documentation"
match: "example_secret_key"
- name: "Test fixtures"
match: "test_api_key_12345"
- name: "Placeholder values"
match: "REPLACE_WITH_YOUR_KEY"
# Scan configuration
exit-zero: false # ⚠️ MANDATORY - Fail build on secrets
verbose: true # Detailed output
show-secrets: false # Don't display actual secrets in logs
ignore-known-secrets: false # Scan all secrets (don't skip known ones)
timeout: 300 # 5 minute timeout
minimum-severity: "LOW" # Detect all severity levels
# Policy enforcement
banlisted-detectors: [] # Don't disable any detectors