Ignore Secrets

Ignore Secrets if not needed

Use case

FlyingDuck can detect over 150 types of secrets within the source code. In some cases, certain secrets may not be sensitive to the organization and can be ignored. You can exclude these secrets using the following three methods.

Ways to ignore

  • Ignore secrets by Line
  • Ignore secrets by File
  • Ignore secrets by Type

Ignore secrets by Line

Description:

If you want to ignore a specific secret that is detected in the portal, then you can simply add a line just above the secret as # fd_secret_ignore. This will make sure the secret is scanned but not appeared in the portal results.

Note: If you are using languages that do not accept # as a comment symbol, use the appropriate comment symbol, followed by a space and then the label fd_secret_ignore.

Remediation:

# fd_secret_ignore

AWS Access Key ID = AKIAIOSFODNN7EXAMPLE 

AWS Secret Access Key = wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY

In the above scenario the AWS Access Key ID will be ignored but the AWS Secret Access Key is detected and reported.

Ignore secrets by File

Description:

If you want to ignore a complete file from being scanned for secrets, then you can specify this file in the .fdignore.yaml file and that will take care of the rest.

Remediation:

  1. Create a .fdignore.yaml file in the root directory of GitHub repository.

  2. Add the following lines into that file as many as needed.

secrets: 

    files: 

        - src/app/config.yaml
        - src/components/broker.js
  1. If more files are needed, then add those file paths by following the above syntax.

  2. If you would like to ignore a complete directory, then use regular expressions.

In this case all the file paths and directories listed in this file will be ignored by the agent for secret scanning, so that those secrets do not appear in the portal.

Ignore secrets by Type

Description:

If you want to ignore a specific secret type such as emails or usernames, then you can add those secret key names into the .fdignore.yaml file and that will skip reporting those secrets to the portal. Please refer to this for the complete list of secret names.

Remediation:

Create a .fdignore.yaml.

If it is already created, then add the following lines into that as needed.

secrets: 

    types: 

        - GITHUB_PAT

        - CIRCLECI_AT

If more secret types are to be ignored, then add them by following the above given syntax.

Note: Make sure to use the exact secret key name as displayed in the list.

In this case all the mentioned secret types listed in the file will be ignored by the agent for those specific secrets and only reports the remaining secrets detected.

Secrets

In managing various applications and services, it's essential to handle secrets securely. Secrets include sensitive information such as API keys, access tokens, client IDs, and other credentials that are used to authenticate and authorize access to different services. Below are some examples of these secrets:


Secret NamesCode
Abstract KeyABSTRACT_KEY
Abbysale KeyABBYSALE_KEY
Accuweather KeyACCUWEATHER_KEY
Adafruitio KeyADAFRUITIO_KEY
Adobe Client SecretADOBE_CLIENT_SECRET
Adobeio IdADOBEIO_ID
Adobeio KeyADOBEIO_KEY
Adzuna IdADZUNA_ID
Adzuna KeyADZUNA_KEY
Aero Workflow KeyAERO_WORKFLOW_KEY
Age secret keyAGE_SECRET_KEY
Aha KeyAHA_KEY
Air Visual KeyAIR_VISUAL_KEY
Airbrake IdAIRBRAKE_ID
Airbrake Project KeyAIRBRAKE_PROJECT_KEY
Airbrake User KeyAIRBRAKE_USER_KEY
Airtable Api KeyAIRTABLE_API_KEY
Airship KeyAIRSHIP_KEY
Alchemy KeyALCHEMY_KEY
Alconost KeyALCONOST_KEY
Alegra IdALEGRA_ID
Alegra KeyALEGRA_KEY
Aletheia API KeyALETHEIA_API_KEY
Algolia Admin KeyALGOLIA_ADMIN_KEY
Algolia IdALGOLIA_ID
Alibaba IdALIBABA_ID
Alibaba KeyALIBABA_KEY
Apideck KeyAPIDECK_KEY
ApifonicaAPIFONICA
Apify KeyAPIFY_KEY
Auth0 domainAUTH0_DOMAIN
Auth0 domain 2AUTH0_DOMAIN_2
AWS IAM IDAWS_IAM_ID
Ayrshare KeyAYRSHARE_KEY
Beamer API tokenBEAMER_API_TOKEN
Caflou KeyCAFLOU_KEY
Cashboard KeyCASHBOARD_KEY
CCavenue Access CodeCCAVENUE_ACCESS_CODE
CCavenue Encryption KeyCCAVENUE_ENCRYPTION_KEY
CCavenue merchant idCCAVENUE_MERCHANT_ID
Checkout IdCHECKOUT_ID
Checkout KeyCHECKOUT_KEY
CircleCI access tokensCIRCLECI_AT
Clickhelp ServerCLICKHELP_SERVER
Clickup personal TokenCLICKUP_PT
Clojars API tokenCLOJARS_API_TOKEN
CloseCRM KeyCLOSECRM_KEY
Column KeyCOLUMN_KEY
Contentful Personal Access TokenCONTENTFUL_PAT
Courier KeyCOURIER_KEY
Credit Card NumberCREDIT_CARD_NUMBER
Databricks API tokenDATABRICKS_API_TOKEN
Datadog Application KeyDATADOG_APPLICATION_KEY
Deputy URLDEPUTY_URL
Dfuse KeyDFUSE_KEY
Digital Ocean v2DIGITAL_OCEAN_V2
Discord API keyDISCORD_API_KEY
Discord Bot KeyDISCORD_BOT_KEY
Discord client IDDISCORD_CLIENT_ID
Discord client secretDISCORD_CLIENT_SECRET
Ditto KeyDITTO_KEY
Documo KeyDOCUMO_KEY
Docker Access TokenDOCKER_AT
Docker Hub Personal Access TokenDOCKER_HUB_PAT
Doppler API tokenDOPPLER_API_TOKEN
Dotmailer KeyDOTMAILER_KEY
Dropbox long lived API tokenDROPBOX_LONG_LIVED_API_TOKEN
Duffel API tokenDUFFEL_API_TOKEN
Dynatrace API tokenDYNATRACE_API_TOKEN
EasyPost API tokenEASYPOST_API_TOKEN
Email IDEMAIL_ID
Everhour KeyEVERHOUR_KEY
Fleetbase KeyFLEETBASE_KEY
Flightlabs KeyFLIGHTLABS_KEY
Flutterwave encrypted keyFLUTTERWARE_ENCRYPTED_KEY
Flutterwave public keyFLUTTERWARE_PUBLIC_KEY
Flutterwave secret keyFLUTTERWARE_SECRET_KEY
Frame.io API tokenFRAME_IO_API_TOKEN
GitHub Personal Access TokenGITHUB_PAT
GitLab Agent for Kubernetes tokenGITLAB_AGENT_KUBERNETES_TOKEN
GitLab CI Build (Job) tokenGITLAB_CI_BUILD_JOB_TOKEN
GitLab Deploy TokenGITLAB_DEPLOY_TOKEN
GitLab Feed tokenGITLAB_FEED_TOKEN
GitLab Incoming email tokenGITLAB_INCOMING_EMAIL_TOKEN
GitLab OAuth Application SecretsGITLAB_OAUTH_APPLICATION_SECRETS
GitLab Personal Access TokenGITLAB_PAT
GitLab Pipeline Trigger TokenGITLAB_PIPELINE_TRIGGER_TOKEN
GitLab Runner Authentication TokenGITLAB_RUNNER_AT
GitLab Runner Registration TokenGITLAB_RUNNER_REGISTRATION_TOKEN
GitLab SCIM tokenGITLAB_SCIM_TOKEN
GCP Access Key IdGCP_ACCESS_KEY_ID
GCP OAuth client secretGCP_OAUTH_CLIENT_SECRET
Google (GCP) Service-accountGOOGLE_GCP_SERVICE_ACCOUNT
Google KeyGOOGLE_KEY
Hashicorp Terraform user/org API tokenHASHICORP_TERRAFORM_API_TOKEN
Hashicorp Vault batch tokenHASHICORP_VAULT_BATCH_TOKEN
Hubspot Access TokenHUBSPOT_AT
Hubspot API tokenHUBSPOT_API_TOKEN
Intercom API tokenINTERCOM_API_TOKEN
Intercom client secret/IDINTERCOM_CLIENT_SECRET_ID
Ionic API tokenIONIC_API_TOKEN
Jfrog Token IdJFROG_TOKEN_ID
JWT TokenJWT_TOKEN
KeyKEY
Linear API tokenLINEAR_API_TOKEN
Lob API KeyLOB_API_KEY
Lob Publishable API KeyLOB_PUBLISHABLE_API_KEY
Mailchimp API keyMAILCHIMP_API_KEY
Mailgun private API tokenMAILGUN_PRIVATE_API_TOKEN
Mailgun public validation keyMAILGUN_PUBLIC_VALIDATION_KEY
Mailgun webhook signing keyMAILGUN_WEBHOOK_SIGNING_KEY
Mapbox API tokenMAPBOX_API_TOKEN
MessageBird API client IDMESSAGEBIRD_API_CLIENT_ID
Meta access tokenMETA_AT
New Relic ingest browser API tokenNEW_RELIC_INGEST_BROWSER_API_TOKEN
New Relic user API KeyNEW_RELIC_USER_API_KEY
Newrelic KeyNEWRELIC_KEY
NPM access tokenNPM_ACCESS_TOKEN
Oculus access tokenOCULUS_AT
Open AI API keyOPENAI_API_KEY
PasswordPASSWORD
Planetscale API tokenPLANETSCALE_API_TOKEN
Planetscale passwordPLANETSCALE_PASSWORD
Postman API tokenPOSTMAN_API_TOKEN
Pulumi API tokenPULUMI_API_TOKEN
Razorpay Key IdRAZORPAY_KEY_ID
Razorpay Key SecretRAZORPAY_KEY_SECRET
Rubygem API tokenRUBYGEM_API_TOKEN
Segment Public API tokenSEGMENT_PUBLIC_API_TOKEN
Sendgrid API tokenSENDGRID_API_TOKEN
Sendinblue API tokenSENDINBLUE_API_TOKEN
Sendinblue SMTP tokenSENDINBLUE_SMTP_TOKEN
Shippo API tokenSHIPPO_API_TOKEN
Shopify access tokenSHOPIFY_AT
Shopify custom app access tokenSHOPIFY_CUSTOM_APP_AT
Shopify private app access tokenSHOPIFY_PRIVATE_APP_AT
Shopify shared secretSHOPIFY_SHARED_SECRET
Slack tokenSLACK_TOKEN
Slack WebhookSLACK_WEBHOOK
Stripe tokenSTRIPE_TOKEN
Tailscale keyTAILSCALE_KEY
TokenTOKEN
Twilio API KeyTWILIO_API_KEY
Twitter Access TokenTWITTER_AT
Twitter Access Token SecretTWITTER_AT_SECRET
Twitter Consumer Key (API Key)TWITTER_CONSUMER_API_KEY
Twitter Consumer Secret (API Secret)TWITTER_CONSUMER_API_SECRET
Typeform API tokenTYPEFORM_API_TOKEN
UsernameUSERNAME
Yandex.Cloud AWS API compatible Access SecretYANDEX_CLOUD_AWS_API_ACCESS_SECRET
Yandex.Cloud IAM Cookie v1YANDEX_CLOUD_IAM_COOKIE_V1
Yandex.Cloud IAM Cookie v2YANDEX_CLOUD_IAM_COOKIE_V2
Yandex.Cloud IAM Cookie v3YANDEX_CLOUD_IAM_COOKIE_V3
Zerobounce API KeyZEROBOUNCE_API_KEY