-
Notifications
You must be signed in to change notification settings - Fork 486
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug auditing test_data/config.yaml with binary values #421
Comments
Hmm. I'm unable to reproduce this. Can you provide a minimal YAML file that causes this issue on Cases I've tried:
They all have varying results (raising other issues), but none that raises this traceback that you provided. |
Yes of course, the YAML file that causes this issue is this. Can you reproduce this? |
Oh goodie. This means we have good test cases. But the fact we didn't catch it in our test cases means we're missing something lol. I was able to reproduce with this file. I'll check it out. |
Thank you very much @domanchi !! |
Co-authored-by: detect-secrets-updater <detect-secrets-updater@ibm.com>
We found the following bug scanning detect-secrets project when the file
test_data/config.yaml
is audited:We tried to solve this bug in #414, and we get it in the most cases, but this file includes the following line:
low_entropy_binary_secret: !!binary MjNjcnh1IDJieXJpdXYyeXJpaTJidnl1MnI4OXkyb3UwMg==
. We try to parse this file as YAML from python and we get the following behaviour:As can you see, the secret value changes when the file is parsed as YAML, so I think that this bug can be introduced by the YAML transformer. I'm not sure because I don't know how this transformer works exactly.
I also think that this bug is due to the specific value included in this file and it isn't a generic problem. I don't know how to fix it, so I open this issue to report it.
The text was updated successfully, but these errors were encountered: