Crates.io | infogrep |
lib.rs | infogrep |
version | 3.0.3 |
source | src |
created_at | 2024-09-23 13:38:24.504386 |
updated_at | 2024-09-23 16:46:33.253193 |
description | A tool to grep for sensitive information |
homepage | |
repository | https://github.com/Giardi77/InfoGrep |
max_upload_size | |
id | 1384093 |
size | 326,750 |
Features • Installation • Usage • Contribute to this project
Grep files or directories for sensitive information using predefined patterns.
Add custom patterns in YAML format.
cargo install infogrep
The default pattern is 'secrets' wich points to default-patterns/rules-stable.yml, it contains a lot of regex for sensitive info such as Api Keys (aws, github and a lot more), Asymmetric Private Keys etc ... Another pre-installed patterns yaml is the 'pii', containing a lot of regex for emails, phone numbers and more.
Scan a file:
infogrep -i file1.txt
Scan a directory:
infogrep -i my_dir
Add a custom pattern in ~/.config/infogrep.patterns.json with "name" : "/path/to/yaml.yml"
Scan with a custom pattern:
infogrep -f file.js -p mypattern
Some regex might suck and match a lot of shit, you can use -t flag to truncate the output and see more results at once (default is 400 chars, if you want to see the whole thing set -t 0):
infogrep -i my_dir -t 1000
if you find this tool helpfull and want to give a better/new regex or anything that can improve performace pull request will be welcomed!