@@ -169,14 +169,34 @@ jobs:
169169 - uses : actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955
170170
171171 - name : Scan for secrets with Gitleaks
172+ uses : gitleaks/gitleaks-action@ff98106e4c7b2bc287b24eaf42907196329070c7
173+ env :
174+ GITHUB_TOKEN : ${{ secrets.GITHUB_TOKEN }}
175+ GITLEAKS_CONFIG : .gitleaks.toml
176+ continue-on-error : true
177+ id : gitleaks
178+
179+ - name : Fallback secret scanning (if Gitleaks fails)
180+ if : steps.gitleaks.outcome == 'failure'
172181 run : |
173- echo "⚠️ Gitleaks temporarily disabled due to Git revision issues"
174- echo "Alternative: Using basic pattern matching for critical secrets"
175- # Basic secret pattern check
176- if grep -r -i "password\|secret\|token\|key" --include="*.rs" --include="*.toml" --include="*.yml" . | grep -v ".git" | grep -v "test" | head -5; then
177- echo "⚠️ Potential secrets found - manual review recommended"
182+ echo "⚠️ Gitleaks failed, running fallback secret detection..."
183+
184+ # Enhanced pattern matching for critical secrets
185+ SECRET_PATTERNS="sk-[a-zA-Z0-9]{32,}|api[_-]?key|secret[_-]?key|password|token"
186+
187+ echo "🔍 Scanning for potential secrets..."
188+ if grep -r -E "$SECRET_PATTERNS" --include="*.rs" --include="*.toml" --include="*.yml" --include="*.json" . \
189+ | grep -v ".git" \
190+ | grep -v "/test" \
191+ | grep -v "_test" \
192+ | grep -v "/tests/" \
193+ | grep -v "example" \
194+ | grep -v "demo" \
195+ | head -10; then
196+ echo "⚠️ Potential secrets detected - requires manual review"
197+ echo "This is a fallback scan - please investigate findings manually"
178198 else
179- echo "✅ No obvious secrets detected"
199+ echo "✅ No obvious secrets detected in fallback scan "
180200 fi
181201
182202 - name : TruffleHog OSS scan
0 commit comments