Skip to content

A Magento module for adding the aw_master_id visitor cookie to your site

Notifications You must be signed in to change notification settings

addingwell/magento-master-cookie

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

Magento Master Cookie

A Magento module for adding the aw_master_id visitor cookie to your site

Security

Bearer

To ensure the security of AddingWell’s codebase, this repository uses Bearer to scan and detect vulnerabilities in code. Bearer is an open-source static analysis tool, improving the overall security of the development lifecycle.

Add exception

Some Bearer detections may flag content that is a false positive. In such cases, you can whitelist specific findings to prevent unnecessary alerts. To do so, use bearer:disable comment immediately before the block where the vulnerability is found.

// bearer:disable php_lang_exception
throw new Exception("error for {$user->email}");

Current exceptions

There are no exceptions yet.

Rule ID File Justification
Eg: php_lang_exception Eg: mastercookie/index.php:34 Eg: Write justification

Gitleaks

To ensure the security of AddingWell’s codebase, this repository uses Gitleaks to scan and detect potential sensitive information leaks within version control. Gitleaks is an open-source static analysis tool that helps identify secrets and sensitive data, protecting against accidental exposure and improving the overall security of the development lifecycle.

The implementation of Gitleaks in this repository allows you to:

  • Detect secrets such as API keys, credentials, and tokens that may have been accidentally committed to the repository.
  • Automate secret scanning across all branches and pull requests, ensuring sensitive data is identified early in the development process.
  • Continuously monitor and validate that sensitive information is not exposed in the repository, reducing the risk of data breaches.
  • Generate detailed reports on scan results, providing developers information to fix the problem.

Add exception

Some Gitleaks detections may flag content that is not truly sensitive or is a false positive. In such cases, you can whitelist specific rules or files to prevent unnecessary alerts. To do so, comment the line where the secret is detected with this comment : #gitleaks:allow

SECRET=fake_password #gitleaks:allow

Current exceptions

Secret id Justification

| 💡 Id are formed like this : <commit_hash>:<file_path>:<secret_type>:

About

A Magento module for adding the aw_master_id visitor cookie to your site

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages