Performing Scans Based on Policies
fourclover policy -targetdir mytargetdir -policydir /path/to/policyfiles -out policy_scan_report.jsonrules:
- rule_id: "word-hunter"
meta:
type: "simple"
name: Word Detective
author: VC
severity: high
description: The code includes prohibited terminology.
reference:
- https://owasp.org/www-project-code-review-guide/
classification:
cvss-score: 6.8
cvss-metrics: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
tags: ["security-review", "terminology", "code-review"]
simple:
patterns:
a: "access_token"
b: "api_key"
c: "password"
condition: (a and c) or bLast updated