Secretlint 6: masking API tokens in .bash_history and .zsh_history

azu - Jan 3 '23 - - Dev Community

We have released Secretlint v6, which finds API tokens, passwords, and other sensitive information contained in files.

Secretlint, when executed with a glob or file, such as secretlint "**/*", finds confidential information contained in the file and prints it to standard output.
On the other hand, unlike ESLint and textlint, Secretlint cannot be automatically modified with --fix.
This is because finding and deleting API tokens, etc. will simply break them.

Therefore, any sensitive information found must be reported and manually fixed by the user.
For example, modify it so that it is not hard-coded into the source code, but rather received in an environment variable, etc.

In most cases, you can't automatically fix any confidential information you find, but I've noticed that it's OK to automatically remove or mask any confidential information that has been left in .bash_history or .zsh_history.
To automatically modify API tokens left in history files, Secretlint v6 adds a --format=mask-result formatter .

Usage: masking confidential information in .zsh_history.

The secretlint package itself does not contain rules, but the @secretlint/quick-start package ships with recommended rules, so here is how to do it using @secretlint/quick-start.

  • Requirements: Node.js 16+

You can check if .zsh_history contains sensitive information with the following command.
(You can also check .bash_history by simply changing the file name)

npx @secretlint/quick-start ~/.zsh_history

~/.zsh_history
  9178:25 error [GITHUB_TOKEN] found GitHub Token(GitHub personal access tokens): ghp_wWPw5k4aXcaT4fNP0UcnZwJUVFk6LO0pTEST  @secretlint/secretlint-rule-preset-recommend > @secretlint/secretlint-rule-github

✖ 1 problem (1 error, 0 warnings)
Enter fullscreen mode Exit fullscreen mode

If included, an error will be reported.
Before masking this sensitive information, back up .zsh_history just in case.

cp ~/.zsh_history ~/.zsh_history.bak
Enter fullscreen mode Exit fullscreen mode

You can use --format=mask-result to see the results of masking sensitive information in ~/.zsh_history on standard output.

npx @secretlint/quick-start ~/.zsh_history --format=mask-result

...
: 1672748457:0;GITHUB_TOKEN="****************************************" gh issue list
...

Enter fullscreen mode Exit fullscreen mode

If all is well, use the --output option to overwrite ~/.zsh_history with the masked results.
(Do not overwrite with <command> > ~/.zsh_history)

npx @secretlint/quick-start ~/.zsh_history --format=mask-result --output ~/.zsh_history
Enter fullscreen mode Exit fullscreen mode

Finally, delete the ~/.zsh_history.bak that you backed up.

rm ~/.zsh_history.bak
Enter fullscreen mode Exit fullscreen mode

Motivation

Last month, there was a supply chain attack against PyTorch's PyTorch-nightly using Dependency Confusion.

pip installs PyPI first (strictly speaking, index-url is preferred over extra-index-url) if the in-house repository (registry) and PyPI have the same package name.
Therefore, if you upload malicious code to PyPI with the same name as a package that PyTorch-nightly depends on but was not yet in PyPI, the malware will be automatically installed when you install PyTorch-nightly.
This problem is called Dependency Confusion.

The same problem exists with npm, etc.

When a private registry such as JFrog Artifactory is used in conjunction with a public registry, it is easy to have the same name but different contents in different registries. The following article summarizes how to deal with this Dependency Confusion, and talks about combining measures such as not mixing registries, using namespaces for package names, and using lock files.

The PyTorch-nightly malware seems to have included a process that uploads and steals files in $HOME/* in addition to environment variables, system information, /etc/hosts, /etc/passwd and .ssh/.

The .ssh/ directory can be managed with an SSH key, such as 1Password, so that it cannot be stolen with only the permission to read files.

Credentials are often stored as raw text in .config/ or ~/.aws.
These can be found in 1Password Shell Plugins, op run, zenv, envchain, etc. to avoid storing raw tokens in files.

Other things that can easily be credentialed in the HOME directory are shell history files such as .zsh_history and .bash_history.
I was not comfortable deleting all the history files, and on the other hand, it is troublesome to check them visually, so I thought it would be a good idea to use secretlint to check them automatically.

Although Secretlint does not have an automatic correction mechanism like --fix, I thought it would be possible to implement a pseudo automatic correction by devising an implementation of a formatter that displays error results I implemented a --format=mask-result formatter.

I actually found some issues of them when I tried it, so I masked them out and removed them from the history.

. . . . . . . . . . . . . . . . . . .