A cli and package for validating secrets.
Project description
How2Validate
How2Validate is a security-focused tool designed to validate sensitive secrets by querying official secret provider endpoints. It provides real-time feedback on the authenticity of the credentials, ensuring that the secrets are valid.
Why How2Validate?
The need for How2Validate arises from the growing concern of exposing sensitive information in various applications, repositories, and environments. Leaked API keys, invalid credentials, and misconfigured secrets can lead to significant security vulnerabilities. How2Validate helps mitigate these risks by verifying secrets directly with the official providers before they are used in any system.
Features
- Validate API keys, passwords, and sensitive information: It interacts with official provider authentication endpoints to ensure the authenticity of the secrets.
- Cross-platform support: Packages available for JavaScript, Python, and Docker environments.
- Easy to use: Simplifies secret validation with straightforward commands and functions.
- Real-time feedback: Instantly know the status of your secrets — whether they are valid or not.
How It Works
How2Validate utilizes the official authentication endpoints provided by different service providers (like NPM, GitHub, Snyk, etc.) to validate secrets such as API keys, tokens, and other sensitive data. By querying these trusted endpoints, How2Validate ensures that the secrets are correct and not expired or invalid.
For every provider, How2Validate relies on well-maintained libraries and packages suggested by those providers to handle the authentication process.
Detailed CLI Help
The How2Validate tool provides multiple command-line options for validating secrets with precision.
To see all available commands, use:
how2validate --help
usage: How2Validate Tool [options]
Validate various types of secrets for different services.
options:
-h, --help show this help message and exit
-secretscope Explore the secret universe. Your next target awaits.
-p, --provider Specify your provider. Unleash your validation arsenal.
-s, --service Specify your target service. Validate your secrets with precision.
-sec, --secret Unveil your secrets to verify their authenticity.
-r, --response Monitor the status. View if your secret is Active or InActive.
-R, --report Get detailed reports. Receive validated secrets via email [Alpha Feature].
-v, --version Expose the version.
--update Hack the tool to the latest version.
Ensuring the authenticity of your secrets.
How to Utilize the Functions
How2Validate can be easily installed and used programmatically within Python projects.
Install the package:
pip install how2validate
Import the package and use the validate function:
from how2validate import validate
# Validate secrets programmatically
validation_result = validate(provider,service, secret, response, report)
print(validation_result)
Example usage of validate function:
from how2validate import validate
# Validate secrets programmatically
validation_result = validate(
provider="NPM",
service="NPM Access Token",
secret="<<SECRET_HERE>>",
response=False,
report="useremail@domain.com"
)
print(validation_result)
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file how2validate-0.0.1b4.tar.gz
.
File metadata
- Download URL: how2validate-0.0.1b4.tar.gz
- Upload date:
- Size: 3.0 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.12.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | f8a105e9fb7ff624596abc21cb8cfad808ed166d618baf64dd645a30a0f0d660 |
|
MD5 | 5b81d4f2cb923a3c16056a3cfa15e80f |
|
BLAKE2b-256 | b9218ce924f0c5bd823f915e46fc29879be78bfcf9a8d9aa013488f3b3713dc8 |
File details
Details for the file how2validate-0.0.1b4-py3-none-any.whl
.
File metadata
- Download URL: how2validate-0.0.1b4-py3-none-any.whl
- Upload date:
- Size: 41.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.12.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2b3ee5018e21d7ed1f9ba016f9d521aef80309625b7e3af13500fcf10365ff7e |
|
MD5 | d5dc330e3635a8119a30007b34b3ce6c |
|
BLAKE2b-256 | 0e872c14ed1d85dc6ee84453d86451752d03365c8ed1b3aff7d0bed545742b88 |