You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,18 @@ Once secrets are discovered, further exploitation often requires additional tool
23
23
24
24
To begin using Pipeleek, download the latest binary from the [Releases](https://github.com/CompassSecurity/pipeleek/releases) page.
25
25
26
+
### Quick Install (Linux/macOS)
27
+
28
+
Install the latest version with a single command:
29
+
30
+
```bash
31
+
curl -sL https://compasssecurity.github.io/pipeleek/install.sh | sh
32
+
```
33
+
34
+
> **⚠️ Security Warning:** Piping scripts directly to `sh` can be dangerous. Always review the script contents first at [https://compasssecurity.github.io/pipeleek/install.sh](https://compasssecurity.github.io/pipeleek/install.sh) before executing.
Copy file name to clipboardExpand all lines: docs/introduction/getting_started.md
+69-4Lines changed: 69 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,24 +10,89 @@ keywords:
10
10
- secrets scanning tutorial
11
11
---
12
12
13
+
<style>
14
+
@keyframesslide {
15
+
0% { transform: translateX(0); }
16
+
100% { transform: translateX(-100%); }
17
+
}
18
+
.secret-stream {
19
+
display: flex;
20
+
gap: 30px;
21
+
animation: slide 20slinearinfinite;
22
+
font-size: 2em;
23
+
margin: 20px0;
24
+
min-width: 200%;
25
+
}
26
+
.stream-container {
27
+
overflow: hidden;
28
+
width: 100%;
29
+
display: flex;
30
+
}
31
+
</style>
32
+
13
33
<palign="center">
14
34
<imgstyle="max-height: 10rem"src="https://github.com/CompassSecurity/pipeleek/blob/main/docs/logo.png?raw=true"alt="Pipeleek Logo - CI/CD Pipeline Secrets Scanner">
15
35
</p>
16
36
17
-
# Why Pipeleek? {#why}
37
+
<divclass="stream-container">
38
+
<divclass="secret-stream">
39
+
<span>💎</span>
40
+
<span>🗝️</span>
41
+
<span>🔐</span>
42
+
<span>💳</span>
43
+
<span>🎫</span>
44
+
<span>🪙</span>
45
+
<span>💰</span>
46
+
<span>🔑</span>
47
+
<span>💎</span>
48
+
<span>🗝️</span>
49
+
<span>🔐</span>
50
+
<span>💳</span>
51
+
<span>🎫</span>
52
+
<span>🪙</span>
53
+
<span>💰</span>
54
+
<span>🔑</span>
55
+
<span>💎</span>
56
+
<span>🗝️</span>
57
+
<span>🔐</span>
58
+
<span>💳</span>
59
+
<span>🎫</span>
60
+
<span>🪙</span>
61
+
<span>💰</span>
62
+
<span>🔑</span>
63
+
<span>💎</span>
64
+
<span>🗝️</span>
65
+
<span>🔐</span>
66
+
<span>💳</span>
67
+
<span>🎫</span>
68
+
<span>🪙</span>
69
+
<span>💰</span>
70
+
<span>🔑</span>
71
+
</div>
72
+
</div>
73
+
74
+
## Why Pipeleek? {#why}
18
75
19
76
Scanning for credentials in CI/CD pipelines is interesting because secrets often end up in pipeline logs or build artifacts that traditional Git scanners won’t check.
20
77
This means you can catch leaked secrets that are injected or generated at runtime, not just those committed to Git.
21
78
22
79
Once secrets are discovered, further exploitation often requires additional tooling. Pipeleek provides several helper commands to assist with this process.
23
80
24
-
# Getting Started
25
-
26
81
## Installation
27
82
83
+
### Quick Install (Linux/macOS)
84
+
85
+
Install the latest version with a single command:
86
+
87
+
```bash
88
+
curl -sL https://compasssecurity.github.io/pipeleek/install.sh | sh
89
+
```
90
+
91
+
> **⚠️ Security Warning:** Piping scripts directly to `sh` can be dangerous. Always review the script contents first at [https://compasssecurity.github.io/pipeleek/install.sh](https://compasssecurity.github.io/pipeleek/install.sh) before executing.
92
+
28
93
### Install with Go
29
94
30
-
The recommended way to install Pipeleek is using Go:
95
+
Alternatively, install using Go:
31
96
32
97
```bash
33
98
go install github.com/CompassSecurity/pipeleek/cmd/pipeleek@latest
Copy file name to clipboardExpand all lines: docs/methodology/elk.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ keywords:
9
9
- log analysis
10
10
---
11
11
12
-
# ELK Integration for Pipeline Secrets Analysis
12
+
##ELK Integration for Pipeline Secrets Analysis
13
13
14
14
To easily analyze the results you can [redirect the pipeleek](https://github.com/deviantony/docker-elk?tab=readme-ov-file#injecting-data) output using `nc` into Logstash.
Copy file name to clipboardExpand all lines: docs/methodology/gitlab.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ keywords:
13
13
14
14
Many companies use (self-hosted) GitLab instances to manage their source codes, often exposing sensitive data through CI/CD pipelines. In times when a lot of infrastructure is deployed as code (IaC) these configurations must be source-controlled as well, putting a lot of responsibility on the source code platform used.
15
15
16
-
# Anonymous Access
16
+
##Anonymous Access
17
17
18
18
If you do not have credentials for the GitLab instance you might want to look at the public repositories and test if you can sign up for an account.
19
19
@@ -25,7 +25,7 @@ See if you can already identify potentially sensitive data e.g. credentials in s
25
25
The next step would be to try to create an account. Head to `https://leakycompany.com/users/sign_up` and try to register a new account.
26
26
Sometimes you can only create an account with an email address managed by the customer, some instances require the admins to accept the register request, and others completely disable it.
27
27
28
-
# Authenticated Access
28
+
##Authenticated Access
29
29
30
30
Sweet now you have access to the GitLab instance with an account.
31
31
The first thing to look out for: What projects do I have access to? Is it more than unauthenticated?
2024-11-14T14:29:05+01:00 info Fetching CVEs for this version version=17.5.1-ee
50
50
```
51
51
52
-
# Misconfigurations And Mishandling
53
-
54
52
## Enumerating CI/CD Variables And Secure Files
55
53
56
54
If you already have access to projects and groups you can try to enumerate CI/CD variables and use these for potential privilege escalation/lateral movement paths.
@@ -168,7 +166,7 @@ Review the findings manually and tweak the flags according to your needs.
168
166
169
167
If you found any valid credentials, e.g. personal access tokens, cloud credentials, and so on, check if you can move laterally or escalate privileges.
170
168
171
-
**An example of privilege escalation:**
169
+
### An example of privilege escalation
172
170
173
171
Pipeleek identified the following based64 encode secret in the environment variable `CI_REPO_TOKEN`:
0 commit comments