A secretlint rule for database-connection-string
npm install @secretlint/secretlint-rule-database-connection-stringA Secretlint rule to detect hardcoded passwords in database connection strings for MongoDB, MySQL, and PostgreSQL.
This rule detects URI format database connection strings that contain hardcoded credentials for MongoDB, MySQL, and PostgreSQL.
Install with npm:
npm install @secretlint/secretlint-rule-database-connection-string
Report when hardcoded credentials are found in MongoDB connection strings.
Detects:
- Standard URI format: mongodb://user:password@host:port/database
- MongoDB Atlas SRV format: mongodb+srv://user:password@cluster.mongodb.net/database
- Connection strings within quoted strings and environment variable assignments
Good:
```
const uri = "mongodb://localhost:27017/mydb";
const uri = "mongodb://username:${PASSWORD}@host:27017/mydb";
const uri = "mongodb://username:REPLACE_WITH_PASSWORD@localhost:27017/mydb"; // placeholder
const uri = "mongodb+srv://user:{password}@cluster.mongodb.net/test";
Bad:
``
const uri = "mongodb://user:s3cr3tP4ss@cluster.mongodb.net/mydb";
MONGO_URI="mongodb://admin:realP@ssw0rd@cluster.mongodb.net/production";
mongodb+srv://app:c0mpl3xPwd@cluster0.mongodb.net/mydb?retryWrites=true;
Report when hardcoded credentials are found in MySQL connection strings.
Detects:
- URI format: mysql://user:password@host:port/databasejdbc:mysql://user:password@host:port/database
- JDBC format: mysqlx://user:password@host:port/database
- X DevAPI format:
Good:
``
const uri = "mysql://localhost:3306/mydb";
const uri = "mysql://user:${PASSWORD}@host:3306/mydb";
const uri = "mysql://user:REPLACE_WITH_PASSWORD@localhost:3306/mydb"; // placeholder
Bad:
``
const uri = "mysql://user:hardcodedpass@db.example.com:3306/mydb";
const jdbc = "jdbc:mysql://admin:s3cr3tPwd@db.company.com:3306/app";
Report when hardcoded credentials are found in PostgreSQL connection strings.
Detects:
- URI format: postgresql://user:password@host:port/databasepostgres://user:password@host:port/database
- Alternative URI format:
Good:
``
const uri = "postgresql://localhost:5432/mydb";
const uri = "postgres://user:${PASSWORD}@host:5432/mydb";
const uri = "postgres://user:REPLACE_WITH_PASSWORD@localhost:5432/mydb"; // placeholder
Bad:
``
const uri = "postgres://user:secretpass@db.example.com:5432/mydb";
create_engine('postgresql://postgres:c0mpl3xPwd@host:5432/mydb')
- allows: string[]
- Allows a list of RegExp-like String to exclude specific patterns from detection.
This rule includes several mechanisms to prevent false positives:
1. Variable Pattern Detection: Automatically ignores common variable patterns like ${PASSWORD}, {password}, {{username}}password
2. Placeholder Detection: Skips common placeholder values like , username, YOUR_PASSWORD, etc.
3. Entropy Analysis: Uses entropy calculation to distinguish real passwords from simple placeholder text
4. Minimum Length: Requires passwords to be at least 4 characters long to reduce noise
Example patterns that are ignored:
``
mongodb://username:password@localhost:27017/database
mysql://user:${PASSWORD}@host:3306/db
postgresql://{username}:{password}@host:5432/db
See Releases page.
No Test to avoid Dependency cycles.
Pull requests and stars are always welcome.
For bugs and feature requests, please create an issue.
1. Fork it!
2. Create your feature branch: git checkout -b my-new-featuregit commit -am 'Add some feature'
3. Commit your changes: git push origin my-new-feature`
4. Push to the branch:
5. Submit a pull request :D
MIT © azu