Checks filenames to be committed against a library of filename rules to prevent sensitive files in Git
npm install ban-sensitive-files> Checks filenames to be committed against a library of filename rules
> to prevent storing sensitive files in Git.
> Checks some files for sensitive contents (for example authToken inside .npmrc file)
[![NPM][ban-sensitive-files-icon] ][ban-sensitive-files-url]
[![Build status][ban-sensitive-files-ci-image] ][ban-sensitive-files-ci-url]
[![semantic-release][semantic-image] ][semantic-url]

 [![renovate-app badge][renovate-badge]][renovate-app]
Note: the source file with rules was taken from file
git-deny-patterns.json
from repo jandre/safe-commit-hook on Dec 2015.
Can you accidentally add id_rsa file to your Github? Sure!
But remember, it will be very hard to remove
traces of them later. [Most popular NPM packages have leaked sensitive information by mistake][1].
Wouldn't be easier to never commit files that should not be committed in the first place?
This project is a easy to use CLI or git pre-commit hook filter that will scrape modified or added
filenames to make sure they do not match widely common patterns (.pem, etc.)
[1]: https://github.com/ChALkeR/notes/blob/master/Do-not-underestimate-credentials-leaks.md
For example, here is ban in action - stopping me from adding NPM registry _authToken to.npmrc file

Add to your project npm install --save-dev ban-sensitive-files
* From the command line node node_modules/.bin/ban when you have any staged files
to check their filenames.
* From NPM script
``json`
"scripts": {
"ban": "ban"
}
Then run npm run ban to check modified, added or deleted filenames.-f
You can check ALL repo filenames again by adding command line flag to form the full commandnpm run ban -- -f.
* When using from other Git hook projects, for example from pre-git,
first, add "ban" NPM script command, then add to the pre-commit command list
`json`
"config": {
"pre-git": {
"pre-commit": [
"npm test",
"npm run ban"
]
}
}
* When using from a CI you probably want to check all files in the repo, not just
the changed ones. Pass -f or --all option. Example Travis file
`yaml`
script:
- npm run ban -- --all
- npm test
You can use the checker from another module
`js``
var isBanned = require('ban-sensitive-files');
isBanned('path/file/name');
// checks single file, returns true or false
// prints any errors to console.error
isBanned(['name1', 'name2', 'name3']);
// checks list of files
isBanned('file/name', logger);
// use provided logger function instead of console.error
To figure out what the script is doing, enable debug logging
DEBUG=ban npm run ban
Author: Gleb Bahmutov © 2015
* @bahmutov
* glebbahmutov.com
* blog
License: MIT - do anything with the code, but don't blame me if it does not work.
Spread the word: tweet, star on github, etc.
Support: if you find any problems with this module, email / tweet /
open issue on Github
Copyright (c) 2015 Gleb Bahmutov
Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation
files (the "Software"), to deal in the Software without
restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the
Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
[ban-sensitive-files-icon]: https://nodei.co/npm/ban-sensitive-files.svg?downloads=true
[ban-sensitive-files-url]: https://npmjs.org/package/ban-sensitive-files
[ban-sensitive-files-ci-image]: https://github.com/bahmutov/ban-sensitive-files/workflows/ci/badge.svg?branch=master
[ban-sensitive-files-ci-url]: https://github.com/bahmutov/ban-sensitive-files/actions
[semantic-image]: https://img.shields.io/badge/%20%20%F0%9F%93%A6%F0%9F%9A%80-semantic--release-e10079.svg
[semantic-url]: https://github.com/semantic-release/semantic-release
[renovate-badge]: https://img.shields.io/badge/renovate-app-blue.svg
[renovate-app]: https://renovateapp.com/