mirror of
https://github.com/trufflesecurity/trufflehog.git
synced 2024-11-10 07:04:24 +00:00
added new detectors (#743)
This commit is contained in:
parent
8b6eee73bc
commit
fa2d6b90cd
2 changed files with 42 additions and 6 deletions
|
@ -897,6 +897,13 @@ const (
|
|||
DetectorType_Opsgenie DetectorType = 875
|
||||
DetectorType_Gemini DetectorType = 876
|
||||
DetectorType_Honeycomb DetectorType = 877
|
||||
DetectorType_KalturaAppToken DetectorType = 878
|
||||
DetectorType_KalturaSession DetectorType = 879
|
||||
DetectorType_BitGo DetectorType = 880
|
||||
DetectorType_Optidash DetectorType = 881
|
||||
DetectorType_Imgix DetectorType = 882
|
||||
DetectorType_ImageToText DetectorType = 883
|
||||
DetectorType_Page2Images DetectorType = 884
|
||||
)
|
||||
|
||||
// Enum value maps for DetectorType.
|
||||
|
@ -1776,6 +1783,13 @@ var (
|
|||
875: "Opsgenie",
|
||||
876: "Gemini",
|
||||
877: "Honeycomb",
|
||||
878: "KalturaAppToken",
|
||||
879: "KalturaSession",
|
||||
880: "BitGo",
|
||||
881: "Optidash",
|
||||
882: "Imgix",
|
||||
883: "ImageToText",
|
||||
884: "Page2Images",
|
||||
}
|
||||
DetectorType_value = map[string]int32{
|
||||
"Alibaba": 0,
|
||||
|
@ -2652,6 +2666,13 @@ var (
|
|||
"Opsgenie": 875,
|
||||
"Gemini": 876,
|
||||
"Honeycomb": 877,
|
||||
"KalturaAppToken": 878,
|
||||
"KalturaSession": 879,
|
||||
"BitGo": 880,
|
||||
"Optidash": 881,
|
||||
"Imgix": 882,
|
||||
"ImageToText": 883,
|
||||
"Page2Images": 884,
|
||||
}
|
||||
)
|
||||
|
||||
|
@ -3001,7 +3022,7 @@ var file_detectors_proto_rawDesc = []byte{
|
|||
0x16, 0x70, 0x75, 0x62, 0x6c, 0x69, 0x63, 0x5f, 0x6b, 0x65, 0x79, 0x5f, 0x66, 0x69, 0x6e, 0x67,
|
||||
0x65, 0x72, 0x70, 0x72, 0x69, 0x6e, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x14, 0x70,
|
||||
0x75, 0x62, 0x6c, 0x69, 0x63, 0x4b, 0x65, 0x79, 0x46, 0x69, 0x6e, 0x67, 0x65, 0x72, 0x70, 0x72,
|
||||
0x69, 0x6e, 0x74, 0x2a, 0xfe, 0x6d, 0x0a, 0x0c, 0x44, 0x65, 0x74, 0x65, 0x63, 0x74, 0x6f, 0x72,
|
||||
0x69, 0x6e, 0x74, 0x2a, 0xf4, 0x6e, 0x0a, 0x0c, 0x44, 0x65, 0x74, 0x65, 0x63, 0x74, 0x6f, 0x72,
|
||||
0x54, 0x79, 0x70, 0x65, 0x12, 0x0b, 0x0a, 0x07, 0x41, 0x6c, 0x69, 0x62, 0x61, 0x62, 0x61, 0x10,
|
||||
0x00, 0x12, 0x08, 0x0a, 0x04, 0x41, 0x4d, 0x51, 0x50, 0x10, 0x01, 0x12, 0x07, 0x0a, 0x03, 0x41,
|
||||
0x57, 0x53, 0x10, 0x02, 0x12, 0x09, 0x0a, 0x05, 0x41, 0x7a, 0x75, 0x72, 0x65, 0x10, 0x03, 0x12,
|
||||
|
@ -3881,11 +3902,19 @@ var file_detectors_proto_rawDesc = []byte{
|
|||
0x6e, 0x76, 0x65, 0x72, 0x74, 0x10, 0xea, 0x06, 0x12, 0x0d, 0x0a, 0x08, 0x4f, 0x70, 0x73, 0x67,
|
||||
0x65, 0x6e, 0x69, 0x65, 0x10, 0xeb, 0x06, 0x12, 0x0b, 0x0a, 0x06, 0x47, 0x65, 0x6d, 0x69, 0x6e,
|
||||
0x69, 0x10, 0xec, 0x06, 0x12, 0x0e, 0x0a, 0x09, 0x48, 0x6f, 0x6e, 0x65, 0x79, 0x63, 0x6f, 0x6d,
|
||||
0x62, 0x10, 0xed, 0x06, 0x42, 0x3d, 0x5a, 0x3b, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63,
|
||||
0x6f, 0x6d, 0x2f, 0x74, 0x72, 0x75, 0x66, 0x66, 0x6c, 0x65, 0x73, 0x65, 0x63, 0x75, 0x72, 0x69,
|
||||
0x74, 0x79, 0x2f, 0x74, 0x72, 0x75, 0x66, 0x66, 0x6c, 0x65, 0x68, 0x6f, 0x67, 0x2f, 0x76, 0x33,
|
||||
0x2f, 0x70, 0x6b, 0x67, 0x2f, 0x70, 0x62, 0x2f, 0x64, 0x65, 0x74, 0x65, 0x63, 0x74, 0x6f, 0x72,
|
||||
0x73, 0x70, 0x62, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
||||
0x62, 0x10, 0xed, 0x06, 0x12, 0x14, 0x0a, 0x0f, 0x4b, 0x61, 0x6c, 0x74, 0x75, 0x72, 0x61, 0x41,
|
||||
0x70, 0x70, 0x54, 0x6f, 0x6b, 0x65, 0x6e, 0x10, 0xee, 0x06, 0x12, 0x13, 0x0a, 0x0e, 0x4b, 0x61,
|
||||
0x6c, 0x74, 0x75, 0x72, 0x61, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x10, 0xef, 0x06, 0x12,
|
||||
0x0a, 0x0a, 0x05, 0x42, 0x69, 0x74, 0x47, 0x6f, 0x10, 0xf0, 0x06, 0x12, 0x0d, 0x0a, 0x08, 0x4f,
|
||||
0x70, 0x74, 0x69, 0x64, 0x61, 0x73, 0x68, 0x10, 0xf1, 0x06, 0x12, 0x0a, 0x0a, 0x05, 0x49, 0x6d,
|
||||
0x67, 0x69, 0x78, 0x10, 0xf2, 0x06, 0x12, 0x10, 0x0a, 0x0b, 0x49, 0x6d, 0x61, 0x67, 0x65, 0x54,
|
||||
0x6f, 0x54, 0x65, 0x78, 0x74, 0x10, 0xf3, 0x06, 0x12, 0x10, 0x0a, 0x0b, 0x50, 0x61, 0x67, 0x65,
|
||||
0x32, 0x49, 0x6d, 0x61, 0x67, 0x65, 0x73, 0x10, 0xf4, 0x06, 0x42, 0x3d, 0x5a, 0x3b, 0x67, 0x69,
|
||||
0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x74, 0x72, 0x75, 0x66, 0x66, 0x6c, 0x65,
|
||||
0x73, 0x65, 0x63, 0x75, 0x72, 0x69, 0x74, 0x79, 0x2f, 0x74, 0x72, 0x75, 0x66, 0x66, 0x6c, 0x65,
|
||||
0x68, 0x6f, 0x67, 0x2f, 0x76, 0x33, 0x2f, 0x70, 0x6b, 0x67, 0x2f, 0x70, 0x62, 0x2f, 0x64, 0x65,
|
||||
0x74, 0x65, 0x63, 0x74, 0x6f, 0x72, 0x73, 0x70, 0x62, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f,
|
||||
0x33,
|
||||
}
|
||||
|
||||
var (
|
||||
|
|
|
@ -879,6 +879,13 @@ enum DetectorType {
|
|||
Opsgenie = 875;
|
||||
Gemini = 876;
|
||||
Honeycomb = 877;
|
||||
KalturaAppToken = 878;
|
||||
KalturaSession = 879;
|
||||
BitGo = 880;
|
||||
Optidash = 881;
|
||||
Imgix = 882;
|
||||
ImageToText = 883;
|
||||
Page2Images = 884;
|
||||
}
|
||||
|
||||
message Result {
|
||||
|
|
Loading…
Reference in a new issue