@secretlint/secretlint-rule-tailscale
v13.0.2
Published
A secretlint rule for detecting Tailscale keys
Maintainers
Readme
@secretlint/secretlint-rule-tailscale
Tailscale rule for secretlint.
Detects Tailscale keys with the documented tskey- prefix:
tskey-api-— API access tokenstskey-auth-— Pre-authentication keystskey-client-— OAuth client keystskey-scim-— SCIM keystskey-webhook-— Webhook keys
Reference: https://tailscale.com/docs/reference/key-prefixes
Install
Install with npm:
npm install @secretlint/secretlint-rule-tailscaleUsage
Add the rule to your .secretlintrc.json:
{
"rules": [
{
"id": "@secretlint/secretlint-rule-tailscale"
}
]
}MessageIDs
TAILSCALE_API_KEY
found Tailscale API access token: ${props.KEY}
TAILSCALE_AUTH_KEY
found Tailscale pre-authentication key: ${props.KEY}
TAILSCALE_CLIENT_KEY
found Tailscale OAuth client key: ${props.KEY}
TAILSCALE_SCIM_KEY
found Tailscale SCIM key: ${props.KEY}
TAILSCALE_WEBHOOK_KEY
found Tailscale webhook key: ${props.KEY}
TAILSCALE_KEY
found Tailscale key: ${props.KEY}
Fallback message used when the key type does not match a known prefix.
A leaked Tailscale key can grant access to manage devices, ACLs, and network configuration.
Options
allows: string[]- Allows a list of RegExp-like String
Changelog
See Releases page.
Running tests
pnpm testContributing
Pull requests and stars are always welcome.
For bugs and feature requests, please create an issue.
- Fork it!
- Create your feature branch:
git checkout -b my-new-feature - Commit your changes:
git commit -am 'Add some feature' - Push to the branch:
git push origin my-new-feature - Submit a pull request :D
License
MIT © azu
