trufflehog/pkg/analyzer
2024-11-06 07:47:41 -08:00
..
analyzers validate if twitter services are more than one before accessing it. (#3565) 2024-11-06 07:47:41 -08:00
config [analyze] Implement Analyzer interface for github (#3110) 2024-07-26 14:47:03 -07:00
generate_permissions Support for kebab case and dot notation in permission generation tool (#3222) 2024-08-15 10:07:42 -07:00
tui Remove proto (#3489) 2024-10-21 17:16:26 -07:00
cli.go Remove proto (#3489) 2024-10-21 17:16:26 -07:00
README.md Support for kebab case and dot notation in permission generation tool (#3222) 2024-08-15 10:07:42 -07:00

Implementing Analyzers

Defining the Permissions

Permissions can be defined in:

  • lower snake case as permission_name:access_level
  • kebab case as permission-name:read
  • dot notation as permission.name:read

The Permissions are initially defined as a yaml file.

At the top of the analyzer implementation you specify the go generate command.

You can install the generator with go install github.com/trufflesecurity/trufflehog/v3/pkg/analyzer/generate_permissions.

Then you can run go generate ./... to generate the Permission types for the analyzer.

The generated Permission types are to be used in the AnalyzerResult struct when defining the Permissions and in your code.