Skip to content

Conversation

@alessandro-Doyensec
Copy link
Contributor

This PR introduces a custom extractor, AWS Access Keys, by enabling support for running a veles.Detector on specific files.

Using the convert.FromVelesDetectorWithRequire it's possible to create a plugin which actually implements both:

  • filesystem.Extractor
  • veles.Detector

This results into a single plugin for the osv-scalibr cli users which once created, is duplicated as:

@alessandro-Doyensec
Copy link
Contributor Author

Note

Initially (ref: 1306cce) I attempted a different approach: creating a new filesystem.Extractor with a completely separate Name. However, that introduced a usability issue: the user would have had to enable or disable two plugins for the same secret.

@alessandro-Doyensec
Copy link
Contributor Author

Hello @erikvarga

All discussions should be resolved now.

Thank you for the support!

@alessandro-Doyensec
Copy link
Contributor Author

Hello @erikvarga I noticed the failing action and I added 462f138 to address the issue.

It looks like the secrets were returned in a different order on Windows, which caused the failure.

copybara-service bot pushed a commit that referenced this pull request Dec 1, 2025
…-access-key

PiperOrigin-RevId: 838793730
@erikvarga
Copy link
Collaborator

Hello @erikvarga I noticed the failing action and I added 462f138 to address the issue.

It looks like the secrets were returned in a different order on Windows, which caused the failure.

Ah sorry I didn't see this yesterday. We caught this during the internal merge process and ended up adding a similar order ignore clause to the test.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants